First published: Thu Oct 23 2014(Updated: )
displayServiceStatus.php in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) session_id or (2) template_id parameter, related to the command_line variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Centreon Web | =2.5.1 | |
Merethis Centreon Enterprise Server | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3829 is classified as a critical vulnerability due to the potential for remote command execution.
To address CVE-2014-3829, upgrade to Centreon version 2.5.3 or later.
CVE-2014-3829 affects Centreon 2.5.1 and Centreon Enterprise Server 2.2.
Yes, CVE-2014-3829 can be exploited remotely using shell metacharacters.
The exploitation of CVE-2014-3829 involves the session_id or template_id parameters in displayServiceStatus.php.