CVE-2016-2056
HIGHXymon <4.3.25 - Command Injection
Title source: llmDescription
xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/47114
metasploit
WORKING POC
EXCELLENT
by Markus Krell, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/xymon_useradm_cmd_exec.rb
References (5)
Scores
CVSS v3
8.8
EPSS
0.5635
EPSS Percentile
98.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-77
Status
published
Products (33)
debian/debian_linux
8.0
xymon/xymon
4.1.0
xymon/xymon
4.1.1
xymon/xymon
4.1.2 (3 CPE variants)
xymon/xymon
4.2 alfa (3 CPE variants)
xymon/xymon
4.2.0
xymon/xymon
4.2.2 (2 CPE variants)
xymon/xymon
4.2.3 (2 CPE variants)
xymon/xymon
4.3.0 (5 CPE variants)
xymon/xymon
4.3.1
... and 23 more
Published
Apr 13, 2016
Tracked Since
Feb 18, 2026