Centreon include/doc/get_image.php 'img' Parameter Traversal Arbitrary File Access

medium Nessus Plugin ID 31299

Synopsis

The remote web server contains a PHP script that is affected by a directory traversal vulnerability.

Description

The remote host is running Centreon or Oreon, a web-based network supervision program based on Nagios.

The version of Centreon / Oreon installed on the remote host fails to sanitize user-supplied input to the 'img' parameter of the 'include/doc/get_image.php' script before using it to display the contents of a file. Regardless of PHP's 'register_globals' setting, an unauthenticated, remote attacker can exploit this issue to view arbitrary files on the remote host, subject to the privileges under which the web server operates.

Solution

Upgrade to Centreon 1.4.2.4 or later.

See Also

https://github.com/centreon/

Plugin Details

Severity: Medium

ID: 31299

File Name: centreon_img_dir_traversal.nasl

Version: 1.26

Type: remote

Family: CGI abuses

Published: 2/28/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:centreon:centreon, cpe:/a:merethis:centreon

Required KB Items: www/PHP, installed_sw/Centreon

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/29/2008

Vulnerability Publication Date: 2/28/2008

Reference Information

CVE: CVE-2008-1119

BID: 28022

CWE: 22