CVE-2020-36969

NameCVE-2020-36969
DescriptionM/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
monit (PTS)bullseye1:5.27.2-1undetermined
bookworm1:5.33.0-1undetermined
trixie1:5.34.3-1undetermined
forky, sid1:5.35.2-3undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
monitsource(unstable)undetermined

Notes

https://www.exploit-db.com/exploits/49080
check, unclear upstream status

Search for package or bug name: Reporting problems