CVE-2012-2104

Munin - Improper Input Validation

Title source: rule
STIX 2.1

Description

cgi-bin/munin-cgi-graph in Munin 2.x writes data to a log file without sanitizing non-printable characters, which might allow user-assisted remote attackers to inject terminal emulator escape sequences and execute arbitrary commands or delete arbitrary files via a crafted HTTP request.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Helmut Grohne · textwebappscgi
https://www.exploit-db.com/exploits/37084

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/74885
Vendor Advisory x_refsource_confirm
https://support.citrix.com/article/CTX236992
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/6
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/5
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/53032

Scores

EPSS 0.0426
EPSS Percentile 88.9%

Details

CWE
CWE-20
Status published
Products (2)
munin-monitoring/munin 2.0
munin-monitoring/munin 2.1
Published Aug 26, 2012
Tracked Since Feb 18, 2026