### [CVE-2016-7067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7067) ![](https://img.shields.io/static/v1?label=Product&message=monit&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352&color=brighgreen) ### Description Monit before version 5.20.0 is vulnerable to a cross site request forgery attack. Successful exploitation will enable an attacker to disable/enable all monitoring for a particular host or disable/enable monitoring for a specific service. ### POC #### Reference - https://bitbucket.org/tildeslash/monit/commits/c6ec3820e627f85417053e6336de2987f2d863e3?at=master #### Github No PoCs found on GitHub currently.