Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-4173


Directory traversal vulnerability in the trend-data daemon (xymond_rrd) in Xymon 4.x before 4.3.12 allows remote attackers to delete arbitrary files via a .. (dot dot) in the host name in a "drophost" command.


Published

2013-10-11T22:55:39.707

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application xymon xymon ≤ 4.3.1 Yes
Application xymon xymon 4.0 Yes
Application xymon xymon 4.0.1 Yes
Application xymon xymon 4.0.2 Yes
Application xymon xymon 4.0.3 Yes
Application xymon xymon 4.0.4 Yes
Application xymon xymon 4.1.0 Yes
Application xymon xymon 4.1.1 Yes
Application xymon xymon 4.1.2 Yes
Application xymon xymon 4.2.0 Yes
Application xymon xymon 4.2.2 Yes
Application xymon xymon 4.2.3 Yes
Application xymon xymon 4.3.0 Yes

References