Home

Description

The "NagVis" component within Checkmk is vulnerable to reflected cross-site scripting. An attacker can craft a malicious link that will execute arbitrary JavaScript in the context of the browser once clicked. The attack can be performed on both authenticated and unauthenticated users.

PUBLISHED Reserved 2025-01-24 | Published 2025-02-04 | Updated 2025-11-03 | Assigner KoreLogic

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

NagVis 1.9.40 (semver) before 1.9.42
affected

Checkmk 2.3.0p2 (semver) before 2.3.0p10
affected

Credits

This vulnerability was discovered by Jaggar Henry and Jim Becher of KoreLogic, Inc. finder

References

seclists.org/fulldisclosure/2025/Feb/3

www.openwall.com/lists/oss-security/2025/02/04/3

lists.debian.org/debian-lts-announce/2025/05/msg00000.html

korelogic.com/Resources/Advisories/KL-001-2025-001.txt exploit

korelogic.com/Resources/Advisories/KL-001-2025-001.txt third-party-advisory

www.nagvis.org/downloads/changelog/1.9.42 release-notes

checkmk.com/werks?version=2.3.0p10 release-notes

cve.org (CVE-2024-13722)

nvd.nist.gov (CVE-2024-13722)

Download JSON