SB2013101207 - Path traversal in GNU Xymon



SB2013101207 - Path traversal in GNU Xymon

Published: October 12, 2013 Updated: August 10, 2020

Security Bulletin ID SB2013101207
Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Path traversal (CVE-ID: CVE-2013-4173)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the trend-data daemon (xymond_rrd) in Xymon 4.x before 4.3.12. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to delete arbitrary files via a . (dot dot) in the host name in a "drophost" command.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.