CVE-2019-19681
https://notcve.org/view.php?id=CVE-2019-19681
Pandora FMS 7.x suffers from remote code execution vulnerability. With an authenticated user who can modify the alert system, it is possible to define and execute commands as root/Administrator. NOTE: The product vendor states that the vulnerability as it is described is not in fact an actual vulnerability. They state that to be able to create alert commands, you need to have admin rights. They also state that the extended ACL system can disable access to specific sections of the configuration, such as defining new alert commands ** EN DISPUTA ** Pandora FMS 7.x sufre de vulnerabilidad de ejecución remota de código. • https://k4m1ll0.com/cve-2019-19681.html https://medium.com/%40k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a https://pandorafms.com/blog/pandora-fms-vulnerability • CWE-863: Incorrect Authorization •
CVE-2019-13035
https://notcve.org/view.php?id=CVE-2019-13035
Artica Pandora FMS 7.0 NG before 735 suffers from local privilege escalation due to improper permissions on C:\PandoraFMS and its sub-folders, allowing standard users to create new files. Moreover, the Apache service httpd.exe will try to execute cmd.exe from C:\PandoraFMS (the current directory) as NT AUTHORITY\SYSTEM upon web requests to the portal. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. Artica Pandora FMS versión 7.0 NG anterior a 735, sufre de una escalada de privilegios local debido a permisos inapropiados en C:\PandoraFMS y sus subcarpetas, permitiendo a usuarios estándar crear nuevos archivos. Adicionalmente, el servicio de Apache httpd.exe intentará ejecutar cmd.exe desde C:\PandoraFMS (el directorio actual) como NT AUTHORITY\SYSTEM sobre las solicitudes web hacia el portal. • https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md •
CVE-2018-11221
https://notcve.org/view.php?id=CVE-2018-11221
Unauthenticated untrusted file upload in Artica Pandora FMS through version 7.23 allows an attacker to upload an arbitrary plugin via include/ajax/update_manager.ajax in the update system. Subida de archivos no fiables sin autenticación en Artica Pandora FMS hasta la versión 7.23 permite que un atacante suba un plugin arbitrario mediante include/ajax/update_manager.ajax en el sistema de actualización. • https://blog.hackercat.ninja/post/pandoras_box https://pandorafms.com/wp-content/uploads/2018/06/whats-new-723-EN.pdf • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2018-11222
https://notcve.org/view.php?id=CVE-2018-11222
Local File Inclusion (LFI) in Artica Pandora FMS through version 7.23 allows an attacker to call any php file via the /pandora_console/ajax.php ajax endpoint. Inclusión de archivos locales en Artica Pandora FMS hasta la versión 7.23 permite que un atacante llame a cualquier archivo php mediante el endpoint de ajax /pandora_console/ajax.php. • https://blog.hackercat.ninja/post/pandoras_box https://pandorafms.com/wp-content/uploads/2018/06/whats-new-723-EN.pdf • CWE-20: Improper Input Validation •
CVE-2017-15936
https://notcve.org/view.php?id=CVE-2017-15936
In Artica Pandora FMS version 7.0, an Attacker with write Permission can create an agent with an XSS Payload; when a user enters the agent definitions page, the script will get executed. En Artica Pandora FMS 7.0, un atacante con permiso de escritura puede crear un agente con una carga útil XSS. Cuando un usuario entre en la página de definiciones del agente, el script se ejecutará. • https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •