A problem was found in Centreon Web through 19.04.3. An authenticated SQL injection is present in the page include/Administration/parameters/ldap/xml/ldap_host.php. The arId parameter is not properly filtered before being passed to the SQL query.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.certilience.fr/2019/08/CVE-2019-15300-vulnerabilit%C3%A9-centreon-sql-injection | not applicable |
https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html | release notes |
https://github.com/centreon/centreon/pull/8008 | third party advisory patch |
https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html | release notes |
https://github.com/centreon/centreon/pull/8009 | third party advisory patch |
https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html | release notes |