You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 13, 2022. It is now read-only.
BUG REPORT INFORMATION
OS: Centreon-Central-18.10-el7
Vulnerability
The crontab deployed when installing the package or when using the VM executes a perl script as root every day to backup the database:
In this perl script, there are two command executions that use a path defined by a configuration file:
But the permissions to this configuration are too open, as the group may write to it:
[root@centreon-central cron]# ll /etc/centreon/conf.pm -rw-rw-r-- 1 centreon centreon 743 21 déc. 08:00 /etc/centreon/conf.pm
This leads to a privesc to root from any user from the centreon group, of which apache is conveniently a member of:
For instance, apache could change the path in the configuration file to execute a script to get sudo rights when the DB is saved:
It's realistic that apache would be the account to privesc from because of RCEs in Centreon's codebase.
The text was updated successfully, but these errors were encountered: