// For flags

CVE-2019-19699

 

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.

Se presenta una ejecución de código remota Autenticada en Centreon Infrastructure Monitoring Software versiones hasta 19.10 por medio de la configuración inapropiada de Pollers, lo que conlleva a un compromiso del sistema por medio de la configuración inapropiada de apache crontab. Esto permite al usuario de apache modificar un archivo ejecutable ejecutado por root a las 22:30 todos los días. Para explotar la vulnerabilidad, alguien debe tener acceso de Administrador a la Interfaz Web de Centreon y crear un comando main.php?p=60803&type=3 personalizado. El usuario debe configurar el comando Pollers Post-Restart Command para este comando creado previamente por medio del URI main.php?p=60901&o=c&server_id=1. Esto es activado por medio de una exportación de la Poller Configuration.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-10 CVE Reserved
  • 2020-04-06 CVE Published
  • 2023-08-10 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-269: Improper Privilege Management
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Centreon
Search vendor "Centreon"
Centreon
Search vendor "Centreon" for product "Centreon"
<= 19.10
Search vendor "Centreon" for product "Centreon" and version " <= 19.10"
-
Affected