First published: Tue Aug 03 2021(Updated: )
A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Centreon Centreon | <20.04.14 | |
Centreon Centreon | >=20.10.0<20.10.8 | |
Centreon Centreon | >=21.04.0<21.04.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37558 is a SQL injection vulnerability in a MediaWiki script in Centreon before versions 20.04.14, 20.10.8, and 21.04.2.
CVE-2021-37558 has a severity rating of 9.8 (Critical).
An attacker can exploit CVE-2021-37558 by sending specially crafted host_name and service_description parameters to execute arbitrary SQL commands.
CVE-2021-37558 affects Centreon versions before 20.04.14, 20.10.8, and 21.04.2.
You can find more information about CVE-2021-37558 at the following references: [GitHub](https://github.com/centreon/centreon/pull/9796) and [Synacktiv](https://www.synacktiv.com/sites/default/files/2021-07/Centreon_Multiple_vulnerabilities_0.pdf).