CVE-2019-13024
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
01/07/2019
Last modified:
26/07/2019
Description
Centreon 18.x before 18.10.6, 19.x before 19.04.3, and Centreon web before 2.8.29 allows the attacker to execute arbitrary system commands by using the value "init_script"-"Monitoring Engine Binary" in main.get.php to insert a arbitrary command into the database, and execute it by calling the vulnerable page www/include/configuration/configGenerate/xml/generateFiles.php (which passes the inserted value to the database to shell_exec without sanitizing it, allowing one to execute system arbitrary commands).
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:centreon:centreon:19.04.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/153504/Centreon-19.04-Remote-Code-Execution.html
- https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.6.html
- https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04/centreon-19.04.3.html
- https://gist.github.com/mhaskar/c4255f6cf45b19b8a852c780f50576da
- https://github.com/centreon/centreon/pull/7694
- https://shells.systems/centreon-v19-04-remote-code-execution-cve-2019-13024/



