CVE-2014-3828
Merethis Centreon - SQL Injection
Title source: ruleDescription
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/35078
metasploit
WORKING POC
EXCELLENT
by MaZ, juan vazquez · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/centreon_sqli_exec.rb
References (5)
Scores
EPSS
0.7859
EPSS Percentile
99.0%
Classification
CWE
CWE-89
Status
draft
Affected Products (2)
merethis/centreon
merethis/centreon_enterprise_server
Timeline
Published
Oct 23, 2014
Tracked Since
Feb 18, 2026