Page 5 of 59 results (0.009 seconds)

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 1

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. • https://github.com/SpengeSec/CVE-2019-19699 https://download.centreon.com https://spenge.pw/cves https://twitter.com/SpengeSec/status/1204418071764463618 https://www.centreon.com • CWE-269: Improper Privilege Management •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Open redirect via parameter ā€˜pā€™ in login.php in Centreon (19.04.4 and below) allows an attacker to craft a payload and execute unintended behavior. Un Redireccionamiento Abierto mediante el parámetro "p" en el archivo login.php en Centreon (versiones 19.04.4 y por debajo), permite a un atacante diseñar una carga útil y ejecutar un comportamiento no deseado. • https://medium.com/%40mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Local File Inclusion in minPlayCommand.php in Centreon (19.04.4 and below) allows an attacker to traverse paths via a plugin test. Una Inclusión de Archivos Local en el archivo minPlayCommand.php en Centreon (versiones 19.04.4 y por debajo), permite a un atacante saltar rutas por medio de una prueba de plugin. • https://medium.com/%40mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Command Injection in minPlayCommand.php in Centreon (19.04.4 and below) allows an attacker to achieve command injection via a plugin test. Una Inyección de Comandos en el archivo minPlayCommand.php en Centreon (versiones 19.04.4 y por debajo), permite a un atacante lograr una inyección de comandos por medio de una prueba de plugin. • https://medium.com/%40mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Centreon before 18.10.8, 19.04.5, and 19.10.2. It provides sensitive information via an unauthenticated direct request for api/external.php?object=centreon_metric&action=listByService. Se detectó un problema en Centreon versiones anteriores a 18.10.8, 19.04.5 y 19.10.2. Proporciona información confidencial por medio de una petición directa no autenticada para api/external.php? • https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html#centreon-web-18-10-8 https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html#centreon-web-19-04-5 https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10/index.html https://github.com/centreon/centreon/pull/8021 • CWE-425: Direct Request ('Forced Browsing') •