Description
cgi-bin/munin-cgi-graph in Munin 2.x writes data to a log file without sanitizing non-printable characters, which might allow user-assisted remote attackers to inject terminal emulator escape sequences and execute arbitrary commands or delete arbitrary files via a crafted HTTP request.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Helmut Grohne · textwebappscgi
https://www.exploit-db.com/exploits/37084
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/74885
Vendor Advisory x_refsource_confirm
https://support.citrix.com/article/CTX236992
Issue Tracking x_refsource_misc
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668666
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/6
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/5
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/53032
Scores
EPSS
0.0426
EPSS Percentile
88.9%
Details
CWE
CWE-20
Status
published
Products (2)
munin-monitoring/munin
2.0
munin-monitoring/munin
2.1
Published
Aug 26, 2012
Tracked Since
Feb 18, 2026