This exploit demonstrates a Remote Command Execution (RCE) vulnerability in Centreon 19.10.5 by leveraging the Poller's Resources feature to download and execute a reverse shell payload. The payload is executed every 10 minutes by default, making the shell persistent.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:Centreon 19.10.5
Auth required
Prerequisites:Access to Centreon configuration interface · Ability to modify Poller's Resources