8.8
CVSSv3

CVE-2019-13024

Published: 01/07/2019 Updated: 26/07/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 906
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Centreon 18.x prior to 18.10.6, 19.x prior to 19.04.3, and Centreon web prior to 2.8.29 allows the malicious user to execute arbitrary system commands by using the value "init_script"-"Monitoring Engine Binary" in main.get.php to insert a arbitrary command into the database, and execute it by calling the vulnerable page www/include/configuration/configGenerate/xml/generateFiles.php (which passes the inserted value to the database to shell_exec without sanitizing it, allowing one to execute system arbitrary commands).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

centreon centreon 19.04.0

Exploits

#!/usr/bin/python ''' # Exploit Title: Centreon v1904 authenticated Remote Code Execution # Date: 28/06/2019 # Exploit Author: Askar (@mohammadaskar2) # CVE : CVE-2019-13024 # Vendor Homepage: wwwcentreoncom/ # Software link: downloadcentreoncom # Version: v1904 # Tested on: CentOS 76 / PHP 5416 ''' import requests import ...
Centreon version 1904 suffers from an authenticated remote code execution vulnerability ...

Github Repositories

A tool that will allow the brute forcing of the Centreon 19.04 administration panel, and then also allow for RCE after credentials have been obtained.

Centron 1904 Brute Force and RCE - CVE-2019-13024 Due to improper control of failed logins it is possible to attempt to brute force the administration panel of Centreon 1904, and then make use of unsanitized variable control to execute remote commands on the targets server This version of the exploit includes the brute force mode, to attempt to get credentials, then a choice

My write up for the recently retired HackTheBox machine: Wall!

HackTheBox: Wall My write up for the recently retired HackTheBox machine: Wall! Wall was a fairly easy machine, although a little frustrating The machine had a web application vulnerable to RCE, however it was (semi) protected by a WAF Root access involved a vulnerable SUID bit In the beginning As usual, I run nMap: PORT STATE SERVICE VERSION 22/tcp open ssh OpenSS

The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024

CVE-2019-13024 The official exploit code for Centreon v1904 Remote Code Execution CVE-2019-13024

Centreon v.19.04 Remote Code Execution exploit (CVE-2019-13024)

Centreon-RCE Centreon v1904 Remote Code Execution exploit (CVE-2019-13024) Revision of githubcom/mhaskar/CVE-2019-13024 HOW TO USE: Edit argument defaults for convenience, or don't (bottom of script) If needed, edit 'edit_command' function to defeat defenses '-v' for troubleshooting/verbose output (prints response content) EXAMPLES: /centr