Debian Monit vulnerabilities
11 known vulnerabilities affecting debian/monit.
Total CVEs
11
CISA KEV
0
Public exploits
3
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH4MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2022-26563HIGHCVSS 8.8fixed in monit 1:5.32.0-1 (bookworm)2022
CVE-2022-26563 [HIGH] CVE-2022-26563: monit - An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attacke...
An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.
Scope: local
bookworm: resolved (fixed in 1:5.32.0-1)
bullseye: open
forky: resolved (fixed in 1:5.32.0-1)
sid: resolved (fixed in 1:5.32.0-1)
trixie: resolved (fixed in 1:5.32.0-1)
debian
CVE-2020-36969HIGHCVSS 8.72020
CVE-2020-36969 [HIGH] CVE-2020-36969: monit - M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenti...
M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
Scope: local
bookworm: undetermined
bullseye: undetermin
debian
CVE-2020-36968HIGHCVSS 7.12020
CVE-2020-36968 [HIGH] CVE-2020-36968: monit - M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated...
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
Scope: local
bookworm: undetermined
bullseye: undetermined
forky
debian
CVE-2019-11455HIGHCVSS 8.1fixed in monit 1:5.25.3-1 (bookworm)2019
CVE-2019-11455 [HIGH] CVE-2019-11455: monit - A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3...
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
Scope: local
bookworm: resolved (fixed in 1:5.25.3-1)
bullseye: resolved (fixed in 1:5.25.3-
debian
CVE-2019-11454MEDIUMCVSS 6.1fixed in monit 1:5.25.3-1 (bookworm)2019
CVE-2019-11454 [MEDIUM] CVE-2019-11454: monit - Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit befo...
Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
Scope: local
bookworm: resolved (fixed in 1:5.25
debian
CVE-2016-7067MEDIUMCVSS 6.5fixed in monit 1:5.20.0-1 (bookworm)2016
CVE-2016-7067 [MEDIUM] CVE-2016-7067: monit - Monit before version 5.20.0 is vulnerable to a cross site request forgery attack...
Monit before version 5.20.0 is vulnerable to a cross site request forgery attack. Successful exploitation will enable an attacker to disable/enable all monitoring for a particular host or disable/enable monitoring for a specific service.
Scope: local
bookworm: resolved (fixed in 1:5.20.0-1)
bullseye: resolved (fixed in 1:5.20.0-1)
forky: resolved (fixed in 1:5.20.0-1)
debian
CVE-2004-1898CRITICALCVSS 10.0PoCfixed in monit 1:4.2.1-1 (bookworm)2004
CVE-2004-1898 [CRITICAL] CVE-2004-1898: monit - Stack-based buffer overflow in the administration interface in Monit 1.4 through...
Stack-based buffer overflow in the administration interface in Monit 1.4 through 4.2 allows remote attackers to execute arbitrary code via a long username.
Scope: local
bookworm: resolved (fixed in 1:4.2.1-1)
bullseye: resolved (fixed in 1:4.2.1-1)
forky: resolved (fixed in 1:4.2.1-1)
sid: resolved (fixed in 1:4.2.1-1)
trixie: resolved (fixed in 1:4.2.1-1)
debian
CVE-2004-1899MEDIUMCVSS 5.0fixed in monit 1:4.2.1 (bookworm)2004
CVE-2004-1899 [MEDIUM] CVE-2004-1899: monit - The administration interface in Monit 1.4 through 4.2 allows remote attackers to...
The administration interface in Monit 1.4 through 4.2 allows remote attackers to cause an off-by-one overflow via a POST that contains 1024 bytes.
Scope: local
bookworm: resolved (fixed in 1:4.2.1)
bullseye: resolved (fixed in 1:4.2.1)
forky: resolved (fixed in 1:4.2.1)
sid: resolved (fixed in 1:4.2.1)
trixie: resolved (fixed in 1:4.2.1)
debian
CVE-2004-1897MEDIUMCVSS 5.0PoCfixed in monit 1:4.2.1-1 (bookworm)2004
CVE-2004-1897 [MEDIUM] CVE-2004-1897: monit - Administration interface in Monit 1.4 through 4.2 allows remote attackers to cau...
Administration interface in Monit 1.4 through 4.2 allows remote attackers to cause a denial of service (segmentation fault) by sending a Basic Authentication request without a password, which causes Monit to decrement a null pointer and perform an out-of-bounds read.
Scope: local
bookworm: resolved (fixed in 1:4.2.1-1)
bullseye: resolved (fixed in 1:4.2.1-1)
forky: re
debian
CVE-2003-1083CRITICALCVSS 10.0PoCfixed in monit 1:4.2.1-1 (bookworm)2003
CVE-2003-1083 [CRITICAL] CVE-2003-1083: monit - Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execu...
Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.
Scope: local
bookworm: resolved (fixed in 1:4.2.1-1)
bullseye: resolved (fixed in 1:4.2.1-1)
forky: resolved (fixed in 1:4.2.1-1)
sid: resolved (fixed in 1:4.2.1-1)
trixie: resolved (fixed in 1:4.2.1-1)
debian
CVE-2003-1084MEDIUMCVSS 5.0fixed in monit 1:4.2.1-1 (bookworm)2003
CVE-2003-1084 [MEDIUM] CVE-2003-1084: monit - Monit 1.4 to 4.1 allows remote attackers to cause a denial of service (daemon cr...
Monit 1.4 to 4.1 allows remote attackers to cause a denial of service (daemon crash) via an HTTP POST request with a negative Content-Length field.
Scope: local
bookworm: resolved (fixed in 1:4.2.1-1)
bullseye: resolved (fixed in 1:4.2.1-1)
forky: resolved (fixed in 1:4.2.1-1)
sid: resolved (fixed in 1:4.2.1-1)
trixie: resolved (fixed in 1:4.2.1-1)
debian