Permissions, Privileges, and Access Controls in monitor - CVE-2012-0264
Published: December 31, 2013 / Updated: August 10, 2020
Vulnerability identifier: #VU42193
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2012-0264
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: AsuraTeam
Affected software:
monitor
monitor
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
op5 Monitor and op5 Appliance before 5.5.0 do not properly manage session cookies, which allows remote attackers to have an unspecified impact via unspecified vectors.
How to mitigate CVE-2012-0264
Install update from vendor's website.
Sources
- http://seclists.org/fulldisclosure/2012/Jan/62
- http://secunia.com/advisories/47344
- http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf
- http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/
- http://www.osvdb.org/78066
- https://bugs.op5.com/view.php?id=5094