First published: Thu May 21 2020(Updated: )
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Centreon Centreon | >=19.04.0<19.04.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-13252.
The severity of CVE-2020-13252 is critical with a score of 8.8.
The affected software is Centreon version 19.04.0 to 19.04.15.
CVE-2020-13252 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in the RRDdatabase_status_path parameter of a main.get.php request and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
Yes, you can find further information on CVE-2020-13252 at the following references: [1] [2] [3].