Centreon.RRDdatabase_status_path.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Centreon Project Centreon.
The vulnerability is due to improper validation of the RRDdatabase_status_path parameter in an HTTP request. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution with the web server privilege on the target system.
Affected Products
Centreon Project Centreon 19.04.x prior to 19.04.15
Centreon Project Centreon 19.10.x prior to 19.10.12
Centreon Project Centreon 18.x and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/centreon/centreon/pull/8467
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |