Vulnerabilities
Vulnerable Software
Centreon:  >> Centreon  Security Vulnerabilities
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. A SQL injection vulnerability in "Configuration > Users > Contacts / Users" allows remote authenticated users to execute arbitrary SQL commands via the Additional Information parameters.
CVSS Score
8.8
EPSS Score
0.003
Published
2021-07-16
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. A Stored Cross-Site Scripting (XSS) issue in "Configuration > Hosts" allows remote authenticated users to inject arbitrary web script or HTML via the Alias parameter.
CVSS Score
5.4
EPSS Score
0.0
Published
2021-07-16
Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.
CVSS Score
5.4
EPSS Score
0.0
Published
2021-05-26
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
CVSS Score
6.5
EPSS Score
0.001
Published
2021-04-15
Centreon 19.10-3.el7 is affected by a SQL injection vulnerability, where an authorized user is able to inject additional SQL queries to perform remote command execution.
CVSS Score
8.8
EPSS Score
0.027
Published
2021-02-15
Centreon before 19.10.7 exposes Session IDs in server responses.
CVSS Score
4.3
EPSS Score
0.0
Published
2020-05-27
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
CVSS Score
8.8
EPSS Score
0.276
Published
2020-05-21
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.
CVSS Score
7.2
EPSS Score
0.089
Published
2020-04-06
Open redirect via parameter ā€˜p’ in login.php in Centreon (19.04.4 and below) allows an attacker to craft a payload and execute unintended behavior.
CVSS Score
6.1
EPSS Score
0.001
Published
2020-03-20
Local File Inclusion in minPlayCommand.php in Centreon (19.04.4 and below) allows an attacker to traverse paths via a plugin test.
CVSS Score
6.5
EPSS Score
0.002
Published
2020-03-20


Contact Us

Shodan ® - All rights reserved