The exploit demonstrates a command injection vulnerability in Centreon 2.6.1 via the 'persistant' POST parameter, allowing arbitrary shell command execution. It also includes examples of stored XSS and unrestricted file upload vulnerabilities in the same software.
Classification
Working Poc 95%
Attack Type
Rce | Xss | Other
Complexity
Trivial
Reliability
Reliable
Target:Centreon 2.6.1 (CES 3.2)
Auth required
Prerequisites:Valid session cookie (PHPSESSID) · Network access to the target application