Centreon Command Injection
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Aug 2, 2023
Description
Published by the National Vulnerability Database
Jul 14, 2015
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Aug 2, 2023
Last updated
Aug 2, 2023
The
escape_command
function ininclude/Administration/corePerformance/getStats.php
in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (offending file deleted in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in thens_id
parameter.References