Description
The escape_command function in include/Administration/corePerformance/getStats.php in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (fixed in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in the ns_id parameter.
Published: 2015-07-14
Score: 6.5 Medium
EPSS: 5.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-3503 The escape_command function in include/Administration/corePerformance/getStats.php in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (fixed in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in the ns_id parameter.
Github GHSA Github GHSA GHSA-c4fj-3wqq-g9c9 Centreon Command Injection
History

No history.

Subscriptions

Centreon Centreon
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T04:47:17.155Z

Reserved: 2015-02-08T00:00:00.000Z

Link: CVE-2015-1561

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-07-14T16:59:01.267

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-1561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses