First published: Mon Oct 06 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in M/Monit 3.3.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that change user passwords via the fullname and password parameters to /admin/users/update.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Monit | <=3.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6409 has a medium severity rating due to its potential impact on administrative authentication.
To fix CVE-2014-6409, upgrade to M/Monit version 3.3.3 or later.
The attack vector for CVE-2014-6409 is through cross-site request forgery (CSRF) targeting the admin user password update functionality.
CVE-2014-6409 affects users of M/Monit versions 3.3.2 and earlier.
Attackers exploiting CVE-2014-6409 can hijack the authentication of administrators and change user passwords.