PatchSiren cyber security CVE debrief
CVE-2017-6188 Munin Monitoring CVE debrief
CVE-2017-6188 affects Munin's CGI graph handling. When CGI graphs are enabled, supplying multiple upper_limit GET parameters can trigger a local file write that may overwrite files accessible to www-data. The issue is publicly documented in the CVE record, NVD detail, and linked issue/advisory references.
- Vendor
- Munin Monitoring
- Product
- CVE-2017-6188
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Administrators of Munin deployments, especially systems with CGI graphs enabled and any service account or web-accessible paths writable by www-data. Debian and Gentoo package maintainers or operators relying on distro packages should also verify whether they have received a backport.
Technical summary
NVD classifies the issue as CVSS 3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N with CWE-20. The CVE description says Munin before 2.999.6 is vulnerable when CGI graphs are enabled; multiple upper_limit GET parameters can overwrite files accessible to the www-data user. NVD's affected CPE criteria also enumerate Munin version ranges that should be checked against vendor packaging and backports.
Defensive priority
Medium. Prioritize exposed or internet-reachable Munin instances and any host where CGI graphs are enabled, because the impact is integrity-focused file overwrite under the web user account.
Recommended defensive actions
- Upgrade Munin to a fixed release at or above 2.999.6, or install the vendor/distribution package that includes the backported fix.
- Disable CGI graphs if they are not required.
- Limit access to Munin CGI endpoints to trusted administrators or management networks.
- Reduce the permissions of the www-data account and verify it cannot write to sensitive application, configuration, or script paths.
- Review logs and file-integrity monitoring for unexpected overwrites or unusual requests involving upper_limit parameters.
Evidence notes
The supplied CVE description states the bug exists in Munin before 2.999.6 and is triggered when CGI graphs are enabled. The NVD record lists CVSS 3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N and CWE-20, and links issue-tracking/advisory sources including GitHub issue 721, Debian bug 855705, Gentoo GLSA 201710-05, Debian DSA-3794, and SecurityFocus BID 96399. The NVD metadata was modified on 2026-05-13, but the CVE publication date remains 2017-02-22.
Official resources
-
CVE-2017-6188 CVE record
CVE.org
-
CVE-2017-6188 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed through the 2017 CVE/NVD record and linked advisories. No KEV entry or ransomware campaign use is recorded in the supplied data.