Vulnerabilities > CVE-2013-3502 - Credentials Management vulnerability in Gwos Groundwork Monitor 6.7.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | GroundWork monarch_scan.cgi OS Command Injection. CVE-2013-3502. Remote exploit for linux platform |
file | exploits/linux/remote/25001.rb |
id | EDB-ID:25001 |
last seen | 2016-02-03 |
modified | 2013-04-25 |
platform | linux |
port | |
published | 2013-04-25 |
reporter | metasploit |
source | https://www.exploit-db.com/download/25001/ |
title | GroundWork monarch_scan.cgi OS Command Injection |
type | remote |
Metasploit
description | This module exploits a vulnerability found in GroundWork 6.7.0. This software is used for network, application and cloud monitoring. The vulnerability exists in the monarch_scan.cgi where user controlled input is used in the perl qx function. This allows any remote authenticated attacker, regardless of privileges, to inject system commands and gain arbitrary code execution. The module has been tested successfully on GroundWork 6.7.0-br287-gw1571 as distributed within the Ubuntu 10.04 based VM appliance. |
id | MSF:EXPLOIT/LINUX/HTTP/GROUNDWORK_MONARCH_CMD_EXEC |
last seen | 2020-04-11 |
modified | 2017-07-24 |
published | 2013-04-24 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/groundwork_monarch_cmd_exec.rb |
title | GroundWork monarch_scan.cgi OS Command Injection |
References
- http://www.exploit-db.com/exploits/25001
- http://www.exploit-db.com/exploits/25001
- http://www.kb.cert.org/vuls/id/345260
- http://www.kb.cert.org/vuls/id/345260
- https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls
- https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt