Werk #2612: Fixed possible XSS on service detail page using the long service output

Component User interface
Title Fixed possible XSS on service detail page using the long service output
Date Sep 18, 2015
Level Prominent Change
Class Security Fix
Compatibility Compatible - no manual interaction needed
Checkmk versions & editions
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3
Not yet released
Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.2.7i3 Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)

Normaly all check results displayed in the GUI are HTML escaped by default. The escaping was missing for the long service output of the service detail page. So one could create multi line check results containing HTML/Javascript code which would be executed when a user opens the service detail page of the service with the check result containing the injected code.

The issue has been fixed by escaping the long output exactly like the normal plugin output. One difference is left: newline characters are replaced by HTML newlines to make displaying of multiple lines still possible.

If you want the old behaviour back, you can disable the plugin output escaping using the global settings. But please note that an attacker might be able to inject javascript code.

To the list of all Werks