cve-2019-19699
Vulnerability from cvelistv5
Published
2020-04-06 15:30
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://download.centreon.com/ | Vendor Advisory | |
cve@mitre.org | https://github.com/SpengeSec/CVE-2019-19699 | Exploit, Third Party Advisory | |
cve@mitre.org | https://spenge.pw/cves/ | Third Party Advisory | |
cve@mitre.org | https://twitter.com/SpengeSec/status/1204418071764463618 | Third Party Advisory | |
cve@mitre.org | https://www.centreon.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://download.centreon.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/SpengeSec/CVE-2019-19699 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://spenge.pw/cves/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/SpengeSec/status/1204418071764463618 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.centreon.com/ | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://download.centreon.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.centreon.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/SpengeSec/status/1204418071764463618" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://spenge.pw/cves/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/SpengeSec/CVE-2019-19699" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803\u0026type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901\u0026o=c\u0026server_id=1 URI. This is triggered via an export of the Poller Configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-06T15:30:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://download.centreon.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.centreon.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/SpengeSec/status/1204418071764463618" }, { "tags": [ "x_refsource_MISC" ], "url": "https://spenge.pw/cves/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/SpengeSec/CVE-2019-19699" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19699", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803\u0026type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901\u0026o=c\u0026server_id=1 URI. This is triggered via an export of the Poller Configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://download.centreon.com/", "refsource": "MISC", "url": "https://download.centreon.com/" }, { "name": "https://www.centreon.com/", "refsource": "MISC", "url": "https://www.centreon.com/" }, { "name": "https://twitter.com/SpengeSec/status/1204418071764463618", "refsource": "MISC", "url": "https://twitter.com/SpengeSec/status/1204418071764463618" }, { "name": "https://spenge.pw/cves/", "refsource": "MISC", "url": "https://spenge.pw/cves/" }, { "name": "https://github.com/SpengeSec/CVE-2019-19699", "refsource": "MISC", "url": "https://github.com/SpengeSec/CVE-2019-19699" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19699", "datePublished": "2020-04-06T15:30:11", "dateReserved": "2019-12-10T00:00:00", "dateUpdated": "2024-08-05T02:25:12.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-19699\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-04-06T16:15:13.287\",\"lastModified\":\"2024-11-21T04:35:13.133\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803\u0026type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901\u0026o=c\u0026server_id=1 URI. This is triggered via an export of the Poller Configuration.\"},{\"lang\":\"es\",\"value\":\"Se presenta una ejecuci\u00f3n de c\u00f3digo remota Autenticada en Centreon Infrastructure Monitoring Software versiones hasta 19.10 por medio de la configuraci\u00f3n inapropiada de Pollers, lo que conlleva a un compromiso del sistema por medio de la configuraci\u00f3n inapropiada de apache crontab. Esto permite al usuario de apache modificar un archivo ejecutable ejecutado por root a las 22:30 todos los d\u00edas. Para explotar la vulnerabilidad, alguien debe tener acceso de Administrador a la Interfaz Web de Centreon y crear un comando main.php?p=60803\u0026amp;type=3 personalizado. El usuario debe configurar el comando Pollers Post-Restart Command para este comando creado previamente por medio del URI main.php?p=60901\u0026amp;o=c\u0026amp;server_id=1. Esto es activado por medio de una exportaci\u00f3n de la Poller Configuration.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.10\",\"matchCriteriaId\":\"0A4D8CF6-F115-4353-80EE-64FE28E7CB37\"}]}]}],\"references\":[{\"url\":\"https://download.centreon.com/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/SpengeSec/CVE-2019-19699\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://spenge.pw/cves/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://twitter.com/SpengeSec/status/1204418071764463618\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.centreon.com/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://download.centreon.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/SpengeSec/CVE-2019-19699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://spenge.pw/cves/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://twitter.com/SpengeSec/status/1204418071764463618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.centreon.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.