CVE-2020-36968

NameCVE-2020-36968
DescriptionM/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
monit (PTS)bullseye1:5.27.2-1undetermined
bookworm1:5.33.0-1undetermined
trixie1:5.34.3-1undetermined
forky, sid1:5.35.2-3undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
monitsource(unstable)undetermined

Notes

https://www.exploit-db.com/exploits/49081
check, unclear upstream status

Search for package or bug name: Reporting problems