vendor:
Monitorr
by:
Lyhin's Lab
9.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Monitorr
Affected Version From: 1.7.6m
Affected Version To: 1.7.6m
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 19
2020
Monitorr 1.7.6m – Remote Code Execution (Unauthenticated)
Monitorr 1.7.6m is vulnerable to remote code execution due to an unauthenticated upload.php file. An attacker can exploit this vulnerability by sending a maliciously crafted POST request to the upload.php file, which will allow them to execute arbitrary code on the server. This vulnerability was discovered by Lyhin's Lab and detailed in their blog post.
Mitigation:
The vulnerability can be mitigated by removing the upload.php file from the server or by restricting access to it.