Multiple cross-site request forgery (CSRF) vulnerabilities in the Noma component in GroundWork Monitor Enterprise 6.7.0 allow remote attackers to hijack the authentication of unspecified victims for requests that (1) store XSS sequences or (2) delete entries.
Max CVSS
6.8
EPSS Score
0.10%
Published
2013-05-08
Updated
2013-05-08
The Cacti component in GroundWork Monitor Enterprise 6.7.0 does not properly perform authorization checks, which allows remote authenticated users to read or modify configuration settings via unspecified vectors, as demonstrated by reading credentials.
Max CVSS
6.5
EPSS Score
0.28%
Published
2013-05-08
Updated
2013-05-08
Multiple SQL injection vulnerabilities in GroundWork Monitor Enterprise 6.7.0 allow remote authenticated users to execute arbitrary SQL commands via (1) nedi/html/System-Export.php, (2) nedi/html/Devices-List.php, or (3) the Noma component.
Max CVSS
6.5
EPSS Score
0.17%
Published
2013-05-08
Updated
2013-05-08
html/System-NeDi.php in the NeDi component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the scan functionality in the System / NeDi menu.
Max CVSS
6.5
EPSS Score
0.20%
Published
2013-05-08
Updated
2013-05-08
html/System-Files.php in the System File Overview feature in the NeDi component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands via vectors involving file editing.
Max CVSS
6.5
EPSS Score
0.19%
Published
2013-05-08
Updated
2013-05-08
cgi-bin/performance/perfchart.cgi in the Performance component in GroundWork Monitor Enterprise 6.7.0 does not properly restrict XML content, which allows remote attackers to execute arbitrary commands by creating a .shtml file and leveraging Server Side Includes (SSI) functionality.
Max CVSS
7.5
EPSS Score
0.26%
Published
2013-05-08
Updated
2013-05-08

CVE-2013-3502

Public exploit
monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.
Max CVSS
6.5
EPSS Score
12.99%
Published
2013-05-08
Updated
2013-11-03
The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.
Max CVSS
7.5
EPSS Score
0.16%
Published
2013-05-08
Updated
2013-05-08
GroundWork Monitor Enterprise 6.7.0 performs authentication on the basis of the HTTP Referer header, which allows remote attackers to obtain administrative privileges or access files via a crafted header.
Max CVSS
7.5
EPSS Score
0.76%
Published
2013-05-08
Updated
2013-11-25
9 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!