9.8
CVSSv3

CVE-2021-3325

Published: 27/01/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Monitorix 3.13.0 allows remote malicious users to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that some exiting installations became unsafe, upon an update to 3.13.0, unless the new feature was immediately configured.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fibranet monitorix 3.13.0

fedoraproject fedora 32

fedoraproject fedora 33