Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1yeDRqLXgzZmgtOXF3Z84AAiSZ

Centreon Sensitive Data Exposure

In Centreon Web through 2.8.29, disclosure of external components' passwords allows authenticated attackers to move laterally to external components.

Permalink: https://github.com/advisories/GHSA-rx4j-x3fh-9qwg
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yeDRqLXgzZmgtOXF3Z84AAiSZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS Percentage: 0.00125
EPSS Percentile: 0.477

Identifiers: GHSA-rx4j-x3fh-9qwg, CVE-2019-17106
References: Repository: https://github.com/centreon/centreon-archived
Blast Radius: 3.1

Affected Packages

packagist:centreon/centreon
Dependent packages: 0
Dependent repositories: 3
Downloads: 13,599 total
Affected Version Ranges: <= 2.8.29
Fixed in: 2.8.30
All affected versions: 2.7.3
All unaffected versions: 2.99.1, 2.99.2, 2.99.3, 2.99.4, 2.99.5, 18.10.6, 18.10.7, 18.10.8, 18.10.9, 18.10.10, 18.10.11, 18.10.12, 19.4.2, 19.4.3, 19.4.4, 19.4.5, 19.4.6, 19.4.7, 19.4.8, 19.4.9, 19.4.10, 19.4.11, 19.4.12, 19.4.13, 19.4.15, 19.4.16, 19.4.17, 19.4.18, 19.4.19, 19.4.20, 19.10.0, 19.10.1, 19.10.2, 19.10.3, 19.10.4, 19.10.5, 19.10.6, 19.10.7, 19.10.8, 19.10.9, 19.10.10, 19.10.12, 19.10.13, 19.10.14, 19.10.15, 19.10.16, 19.10.17, 19.10.18, 19.10.19, 19.10.20, 19.10.21, 19.10.22, 19.10.23, 20.4.0, 20.4.2, 20.4.3, 20.4.4, 20.4.6, 20.4.7, 20.4.8, 20.4.9, 20.4.10, 20.4.11, 20.4.12, 20.4.13, 20.4.14, 20.4.15, 20.4.16, 20.4.17, 20.4.18, 20.4.19, 20.4.20, 20.10.0, 20.10.1, 20.10.2, 20.10.3, 20.10.4, 20.10.5, 20.10.6, 20.10.7, 20.10.8, 20.10.9, 20.10.10, 20.10.11, 20.10.12, 20.10.13, 20.10.14, 20.10.15, 20.10.16, 20.10.17, 20.10.18, 21.4.0, 21.4.1, 21.4.2, 21.4.3, 21.4.4, 21.4.5, 21.4.6, 21.4.7, 21.4.8, 21.4.9, 21.4.10, 21.4.11, 21.4.12, 21.4.13, 21.4.14, 21.4.15, 21.4.16, 21.4.17, 21.4.18, 21.4.19, 21.4.20, 21.10.0, 21.10.1, 21.10.2, 21.10.3, 21.10.4, 21.10.5, 21.10.6, 21.10.7, 21.10.8, 21.10.9, 21.10.10, 21.10.11, 21.10.12, 21.10.13, 22.4.0, 22.4.1, 22.4.2, 22.4.3, 22.4.4, 22.4.5, 22.4.6, 22.4.7, 22.10.0, 22.10.1, 22.10.2