CVE-2014-3828

Merethis Centreon - SQL Injection

Title source: rule

Description

Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/35078
metasploit WORKING POC EXCELLENT
by MaZ, juan vazquez · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/centreon_sqli_exec.rb
exploitdb WORKING POC
rubywebappslinux
https://www.exploit-db.com/exploits/41676

Scores

EPSS 0.7859
EPSS Percentile 99.0%

Classification

CWE
CWE-89
Status draft

Affected Products (2)

merethis/centreon
merethis/centreon_enterprise_server

Timeline

Published Oct 23, 2014
Tracked Since Feb 18, 2026