Vulnerabilities > CVE-2013-3502 - Credentials Management vulnerability in Gwos Groundwork Monitor 6.7.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
gwos
CWE-255
exploit available
metasploit

Summary

monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.

Vulnerable Configurations

Part Description Count
Application
Gwos
1

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionGroundWork monarch_scan.cgi OS Command Injection. CVE-2013-3502. Remote exploit for linux platform
fileexploits/linux/remote/25001.rb
idEDB-ID:25001
last seen2016-02-03
modified2013-04-25
platformlinux
port
published2013-04-25
reportermetasploit
sourcehttps://www.exploit-db.com/download/25001/
titleGroundWork monarch_scan.cgi OS Command Injection
typeremote

Metasploit

descriptionThis module exploits a vulnerability found in GroundWork 6.7.0. This software is used for network, application and cloud monitoring. The vulnerability exists in the monarch_scan.cgi where user controlled input is used in the perl qx function. This allows any remote authenticated attacker, regardless of privileges, to inject system commands and gain arbitrary code execution. The module has been tested successfully on GroundWork 6.7.0-br287-gw1571 as distributed within the Ubuntu 10.04 based VM appliance.
idMSF:EXPLOIT/LINUX/HTTP/GROUNDWORK_MONARCH_CMD_EXEC
last seen2020-04-11
modified2017-07-24
published2013-04-24
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/groundwork_monarch_cmd_exec.rb
titleGroundWork monarch_scan.cgi OS Command Injection