Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yajRnLXY0ZnYtcmh3Z84AA6g0

Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability

Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.

The specific flaw exists within the updateContactHostCommands function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22298.

Permalink: https://github.com/advisories/GHSA-2j4g-v4fv-rhwg
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yajRnLXY0ZnYtcmh3Z84AA6g0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 month ago
Updated: about 1 month ago


CVSS Score: 7.2
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-2j4g-v4fv-rhwg, CVE-2024-23118
References: Repository: https://github.com/centreon/centreon
Blast Radius: 3.4

Affected Packages

packagist:centreon/centreon
Dependent packages: 0
Dependent repositories: 3
Downloads: 13,599 total
Affected Version Ranges: < 22.10.15
Fixed in: 22.10.15
All affected versions: 2.7.3, 2.99.1, 2.99.2, 2.99.3, 2.99.4, 2.99.5, 18.10.6, 18.10.7, 18.10.8, 18.10.9, 18.10.10, 18.10.11, 18.10.12, 19.4.2, 19.4.3, 19.4.4, 19.4.5, 19.4.6, 19.4.7, 19.4.8, 19.4.9, 19.4.10, 19.4.11, 19.4.12, 19.4.13, 19.4.15, 19.4.16, 19.4.17, 19.4.18, 19.4.19, 19.4.20, 19.10.0, 19.10.1, 19.10.2, 19.10.3, 19.10.4, 19.10.5, 19.10.6, 19.10.7, 19.10.8, 19.10.9, 19.10.10, 19.10.12, 19.10.13, 19.10.14, 19.10.15, 19.10.16, 19.10.17, 19.10.18, 19.10.19, 19.10.20, 19.10.21, 19.10.22, 19.10.23, 20.4.0, 20.4.2, 20.4.3, 20.4.4, 20.4.6, 20.4.7, 20.4.8, 20.4.9, 20.4.10, 20.4.11, 20.4.12, 20.4.13, 20.4.14, 20.4.15, 20.4.16, 20.4.17, 20.4.18, 20.4.19, 20.4.20, 20.10.0, 20.10.1, 20.10.2, 20.10.3, 20.10.4, 20.10.5, 20.10.6, 20.10.7, 20.10.8, 20.10.9, 20.10.10, 20.10.11, 20.10.12, 20.10.13, 20.10.14, 20.10.15, 20.10.16, 20.10.17, 20.10.18, 21.4.0, 21.4.1, 21.4.2, 21.4.3, 21.4.4, 21.4.5, 21.4.6, 21.4.7, 21.4.8, 21.4.9, 21.4.10, 21.4.11, 21.4.12, 21.4.13, 21.4.14, 21.4.15, 21.4.16, 21.4.17, 21.4.18, 21.4.19, 21.4.20, 21.10.0, 21.10.1, 21.10.2, 21.10.3, 21.10.4, 21.10.5, 21.10.6, 21.10.7, 21.10.8, 21.10.9, 21.10.10, 21.10.11, 21.10.12, 21.10.13, 22.4.0, 22.4.1, 22.4.2, 22.4.3, 22.4.4, 22.4.5, 22.4.6, 22.4.7, 22.10.0, 22.10.1, 22.10.2
All unaffected versions: