Centreon 'insertLog()' Function RCE

high Nessus Plugin ID 80358

Synopsis

The remote web server contains a PHP application that is affected by a remote code execution vulnerability.

Description

The Centreon application hosted on the remote web server is affected by a remote code execution vulnerability due to a failure to properly sanitize user-supplied input before using it in a SQL query. The application uses the 'echo' system command with the PHP exec() function which allows a remote, unauthenticated attacker to craft a request and execute arbitrary system commands on the remote host.

Note that the application is also reportedly affected by a local information disclosure vulnerability, however Nessus has not tested for this issue.

Solution

Upgrade to Centreon 2.5.4 or later.

See Also

https://seclists.org/oss-sec/2014/q4/848

https://github.com/centreon/

Plugin Details

Severity: High

ID: 80358

File Name: centreon_file_put_contents_rce.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 1/5/2015

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:centreon:centreon, cpe:/a:merethis:centreon

Required KB Items: www/PHP, installed_sw/Centreon

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 11/27/2014

Vulnerability Publication Date: 11/27/2014

Reference Information

BID: 71333