CVE-2016-2056

HIGH

Xymon <4.3.25 - Command Injection

Title source: llm

Description

xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.

Exploits (2)

metasploit WORKING POC EXCELLENT
by Markus Krell, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/xymon_useradm_cmd_exec.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/47114

Scores

CVSS v3 8.8
EPSS 0.5635
EPSS Percentile 98.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-77
Status draft

Affected Products (44)

xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
... and 29 more

Timeline

Published Apr 13, 2016
Tracked Since Feb 18, 2026