First published: Wed Mar 29 2023(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of requests to modify poller broker configuration. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Centreon Centreon | <21.04.19 | |
Centreon Centreon | >=21.10.0<21.10.11 | |
Centreon Centreon | >=22.04.0<22.04.6 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42424 is a vulnerability that allows remote attackers to escalate privileges on affected installations of Centreon.
To exploit CVE-2022-42424, authentication is required, and the attacker needs to send requests to modify the poller broker configuration.
CVE-2022-42424 has a severity score of 8.8, which is considered high.
CVE-2022-42424 affects Centreon versions up to and including 21.04.19, 21.10.0 to 21.10.11, and 22.04.0 to 22.04.6.
To fix CVE-2022-42424, users should upgrade Centreon to a version that is not affected by the vulnerability.