[//]: # (werk v2)
# Rest API: Improvement of response data types
key | value
---------- | ---
date | 2024-06-13T14:07:51+00:00
version | 2.4.0b1
class | fix
edition | cre
component | rest-api
level | 1
compatible | no
In order to improvide the Rest API, adjustments have been made to the
data types returned in the `comments` and `downtimes` endpoints as
specified below:
* `Show a comment` and `Show comments` endpoints:
`entry_time` now shows the date stamp in ISO 8601 format.
Before: "Jun 03 2024 06:05:41"
Now: "2024-03-06T06:05:41+00:00"
* `Show downtime` and `Show all schedulled downtimes`.
`recurring` and `is_service` fields now are boolean types.
Before:
`recurring`: "yes"
`is_service`: "no"
Now:
`recurring`: true
`is_service`: false
[//]: # (werk v2)
# Test notifications: Match host and service level
key | value
---------- | ---
date | 2024-06-17T09:54:41+00:00
version | 2.4.0b1
class | fix
edition | cre
component | notifications
level | 1
compatible | yes
Even if configured, host and service level did not match while testing
notifications.
This has been fixed.
[//]: # (werk v2)
# sql: Allow macros in 'Query or SQL statement' field
key | value
---------- | ---
date | 2024-06-13T15:56:27+00:00
version | 2.4.0b1
class | fix
edition | cre
component | checks
level | 1
compatible | yes
With the version 2.3, the usage of macros in the `Query or SQL statementw` field of
the `Check SQL database` was disallowed. With this Werk, it's allowed again.
Title: XSS in inventory tree
Class: security
Compatible: compat
Component: inv
Date: 1717744837
Edition: cre
Level: 1
Version: 2.1.0p45
Prior to this Werk an attacker with control over an agent was able to inject HTML in the output which was then rendered in the inventory tree of the coresponding host.
This problem exists only if the rule <em>Do hardware/software inventory</em> is set for the compromised agent/host.
We found this vulnerability internally.
<strong>Affected Versions:</strong>
LI: 2.3.0
LI: 2.2.0
LI: 2.1.0
LI: 2.0.0
<strong>Mitigations</strong>:
If you are unable to patch you can disable inventory scanning for all hosts.
<strong>Indicators of Compromise:</strong>
You can check <code>var/check_mk/inventory/</code> for inventories with embedded HTML.
This only indicates current 'attacks'.
Previous attacks (where the agent does not output the payload anymore) are not discoverable after some time (caching).
<strong>Vulnerability Management:</strong>
We have rated the issue with a CVSS Score of 6.5 (Medium) with the following CVSS vector:
<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L</code>
We assigned CVE-2024-5741 to this vulnerability.
<strong>Changes:</strong>
This Werk adds sanitation to the HTML output.
Title: XSS in inventory tree
Class: security
Compatible: compat
Component: inv
Date: 1717744837
Edition: cre
Level: 1
Version: 2.2.0p28
Prior to this Werk an attacker with control over an agent was able to inject HTML in the output which was then rendered in the inventory tree of the coresponding host.
This problem exists only if the rule <em>Do hardware/software inventory</em> is set for the compromised agent/host.
We found this vulnerability internally.
<strong>Affected Versions:</strong>
LI: 2.3.0
LI: 2.2.0
LI: 2.1.0
LI: 2.0.0
<strong>Mitigations</strong>:
If you are unable to patch you can disable inventory scanning for all hosts.
<strong>Indicators of Compromise:</strong>
You can check <code>var/check_mk/inventory/</code> for inventories with embedded HTML.
This only indicates current 'attacks'.
Previous attacks (where the agent does not output the payload anymore) are not discoverable after some time (caching).
<strong>Vulnerability Management:</strong>
We have rated the issue with a CVSS Score of 6.5 (Medium) with the following CVSS vector:
<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L</code>
We assigned CVE-2024-5741 to this vulnerability.
<strong>Changes:</strong>
This Werk adds sanitation to the HTML output.
[//]: # (werk v2)
# ldap_connection: empty failover_server list should be considered disabled
key | value
---------- | ---
date | 2024-06-04T14:45:47+00:00
version | 2.4.0b1
class | fix
edition | cre
component | rest-api
level | 1
compatible | yes
When configuring an LDAP connection via the REST-API, the default value
for the field failover_servers is an empty list. This value on the backend
should be considered disabled and just not set. Previously, we were saving
an empty list to the ldap config which was causing an error in the UI.