CVE-2016-2056
HIGHXymon <4.3.25 - Command Injection
Title source: llmDescription
xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.
Exploits (2)
metasploit
WORKING POC
EXCELLENT
by Markus Krell, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/xymon_useradm_cmd_exec.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/47114
References (5)
Scores
CVSS v3
8.8
EPSS
0.5635
EPSS Percentile
98.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-77
Status
draft
Affected Products (44)
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
xymon/xymon
... and 29 more
Timeline
Published
Apr 13, 2016
Tracked Since
Feb 18, 2026