Monit before version 5.20.0 is vulnerable to a cross site request forgery attack. Successful exploitation will enable an attacker to disable/enable all monitoring for a particular host or disable/enable monitoring for a specific service.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/93953 | vdb entry third party advisory |
https://seclists.org/oss-sec/2016/q4/267 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7067 | issue tracking third party advisory |
https://bitbucket.org/tildeslash/monit/commits/c6ec3820e627f85417053e6336de2987f2d863e3?at=master | third party advisory exploit |