First published: Thu Mar 05 2020(Updated: )
An issue was discovered in Centreon before 18.10.8, 19.10.1, and 19.04.2. It allows CSRF with resultant remote command execution via shell metacharacters in a POST to centreon-autodiscovery-server/views/scan/ajax/call.php in the Autodiscovery plugin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Centreon Centreon | >=18.0.0<18.10.8 | |
Centreon Centreon | >=19.04.0<19.04.2 | |
Centreon Centreon | >=19.10.0<19.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-17642.
The severity level of CVE-2019-17642 is high.
Centreon versions between 18.0.0 and 18.10.8, 19.04.0 and 19.04.2, and 19.10.0 and 19.10.1 are affected by CVE-2019-17642.
This vulnerability can be exploited through CSRF attacks with resultant remote command execution via shell metacharacters in a POST request to centreon-autodiscovery-server/views/scan/ajax/call.php in the Autodiscovery plugin.
You can find more information about CVE-2019-17642 in the following documentation links: [link1](https://documentation.centreon.com/docs/centreon-auto-discovery/en/latest/release_notes/18.10/centreon-auto-discovery-18.10.8.html), [link2](https://documentation.centreon.com/docs/centreon-auto-discovery/en/latest/release_notes/19.04/centreon-auto-discovery-19.04.2.html), and [link3](https://documentation.centreon.com/docs/centreon-auto-discovery/en/latest/release_notes/19.10/centreon-auto-discovery-19.10.1.html).