First published: Tue Jul 14 2015(Updated: )
The `escape_command` function in `include/Administration/corePerformance/getStats.php` in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (offending file deleted in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in the `ns_id` parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/centreon/centreon | <2.8.28 | 2.8.28 |
Centreon Web | <=2.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1561 has a high severity rating due to its potential to allow unauthorized command execution by remote authenticated users.
To fix CVE-2015-1561, upgrade your Centreon software to version 2.8.28 or later.
Centreon versions 2.5.4 and earlier are affected by CVE-2015-1561.
CVE-2015-1561 is a remote code execution vulnerability due to an incorrect regular expression in the `escape_command` function.
No, CVE-2015-1561 is no longer exploitable in Centreon version 19.10.0 and later, as the offending file was deleted.