Vulnerability Details : CVE-2013-3502
Public exploit exists!
monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.
Exploit prediction scoring system (EPSS) score for CVE-2013-3502
Probability of exploitation activity in the next 30 days: 12.99%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-3502
-
GroundWork monarch_scan.cgi OS Command Injection
Disclosure Date: 2013-03-08First seen: 2020-04-26exploit/linux/http/groundwork_monarch_cmd_execThis module exploits a vulnerability found in GroundWork 6.7.0. This software is used for network, application and cloud monitoring. The vulnerability exists in the monarch_scan.cgi where user controlled input is used in the perl qx function. This allows any remote
CVSS scores for CVE-2013-3502
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2013-3502
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3502
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt
-
http://www.exploit-db.com/exploits/25001
GroundWork - 'monarch_scan.cgi' OS Command Injection (Metasploit) - Linux remote Exploit
-
https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls
Log In - GWConnect
-
http://www.kb.cert.org/vuls/id/345260
VU#345260 - GroundWork Monitor Enterprise contains multiple vulnerabilitiesUS Government Resource
Products affected by CVE-2013-3502
- cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*