displayServiceStatus.php in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) session_id or (2) template_id parameter, related to the command_line variable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Oct/78 - Exploit | |
References | () http://www.kb.cert.org/vuls/id/298796 - Third Party Advisory, US Government Resource | |
References | () https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.5/centreon-2.5.3.html - | |
References | () https://github.com/centreon/centreon/commit/cc2109804dd69057cb209037113796ec5ffdce90#diff-e328097503b14fbb117e0db798aefcde - |
Information
Published : 2014-10-23 01:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3829
Mitre link : CVE-2014-3829
CVE.ORG link : CVE-2014-3829
JSON object : View
Products Affected
merethis
- centreon_enterprise_server
- centreon
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')