8.8
CVSSv3

CVE-2020-13252

Published: 21/05/2020 Updated: 21/05/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Centreon prior to 19.04.15 allows remote malicious users to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

centreon centreon

Github Repositories

ZeroDay exploits that i have shared. #CentreonExploit #rConfigExploit #PandoraFMSExploit

Public Exploits ZeroDay exploits that i have shared CVE-2020-13252 Centreon <= 191015 Authenticated RCE Exploit-DB link: wwwexploit-dbcom/exploits/48256 Advisory link: engindemirbilekgithubio/centreon-1910-rce CVE-2020-10221 rConfig 393 Authenticated RCE Exploit-DB link: wwwexploit-dbcom/exploits/48207 Advisory link: engindemi