Vulnerability Details : CVE-2012-3513
Potential exploit
munin-cgi-graph in Munin before 2.0.6, when running as a CGI module under Apache, allows remote attackers to load new configurations and create files in arbitrary directories via the logdir command.
Products affected by CVE-2012-3513
- cpe:2.3:a:munin-monitoring:munin:*:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc4:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc3:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta1:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc2:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc6:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc5:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta3:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta2:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc7:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta5:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta4:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-rc1:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta7:*:*:*:*:*:*:*
- cpe:2.3:a:munin-monitoring:munin:2.0-beta6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3513
0.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3513
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-3513
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3513
-
http://www.ubuntu.com/usn/USN-1622-1
USN-1622-1: Munin vulnerabilities | Ubuntu security notices
-
http://www.munin-monitoring.org/ticket/1238
#1238 (munin-cgi-graph: HTTP client can control @ARGV when used as a CGI script) – MuninExploit;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/08/21/1
oss-security - Two munin issues, now with CVEs
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684076
#684076 - munin-cgi-graph: User can load new config, pointing log to arbitrary file - Debian Bug report logs
Jump to