Monitorix Built-in HTTP Server Remote Command Execution

critical Nessus Plugin ID 71212

Synopsis

The remote web server is affected by a remote command execution vulnerability.

Description

The remote Monitorix built-in HTTP server does not properly sanitize HTTP GET request strings, allowing for remote, arbitrary command execution via a specially crafted HTTP request.

Solution

Upgrade to Monitorix 3.3.1 or later.

See Also

https://github.com/mikaku/Monitorix/issues/30

http://www.monitorix.org/news.html#N331

Plugin Details

Severity: Critical

ID: 71212

File Name: monitorix_command_exec.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 12/4/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:monitorix:monitorix

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Patch Publication Date: 11/26/2013

Vulnerability Publication Date: 11/20/2013

Reference Information

CVE: CVE-2013-7070

BID: 64178