CVE-2019-17643

7.5 HIGH

📋 TL;DR

This vulnerability in Centreon monitoring software allows unauthenticated attackers to access sensitive information via a direct request to a specific PHP file. It affects Centreon versions before the patched releases, potentially exposing host and service data to unauthorized parties.

💻 Affected Systems

Products:
  • Centreon
Versions: Versions before 2.8-30, 18.10-8, 19.04-5, and 19.10-2
Operating Systems: Linux (Centreon typically runs on Linux)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Centreon installations with the vulnerable file present and accessible via web.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain detailed information about monitored infrastructure including host configurations, service dependencies, and network topology, enabling further targeted attacks.

🟠

Likely Case

Unauthenticated information disclosure revealing internal monitoring data that could be used for reconnaissance or planning additional attacks.

🟢

If Mitigated

No impact if proper network segmentation and authentication controls prevent access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - Direct unauthenticated access to sensitive information without requiring any authentication.
🏢 Internal Only: MEDIUM - Still concerning for internal attackers or compromised systems, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to the vulnerable endpoint can retrieve sensitive XML data without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8-30, 18.10-8, 19.04-5, or 19.10-2 depending on your version

Vendor Advisory: https://documentation.centreon.com/docs/centreon/en/latest/release_notes/

Restart Required: Yes

Instructions:

1. Identify your Centreon version. 2. Upgrade to the appropriate patched version from the release notes. 3. Restart Centreon services. 4. Verify the fix.

🔧 Temporary Workarounds

Block direct access to vulnerable file

linux

Use web server configuration to block access to the specific vulnerable PHP file

# For Apache: Add to .htaccess or virtual host config
<Files "GetXMLHost4Services.php">
    Require all denied
</Files>
# For Nginx: Add to server block
location ~ /include/monitoring/recurrentDowntime/GetXMLHost4Services\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to Centreon web interface to trusted IPs only
  • Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[centreon-server]/centreon/include/monitoring/recurrentDowntime/GetXMLHost4Services.php without authentication. If it returns XML data with host/service information, the system is vulnerable.

Check Version:

# On Centreon server
rpm -qa | grep centreon-web
# Or check Centreon web interface admin panel

Verify Fix Applied:

After patching, attempt the same access and verify you receive an authentication prompt or error instead of XML data.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to GET requests for /include/monitoring/recurrentDowntime/GetXMLHost4Services.php without preceding authentication logs

Network Indicators:

  • Unusual XML data being transmitted from Centreon server to unauthenticated clients

SIEM Query:

web_access_logs status=200 AND uri="*GetXMLHost4Services.php" AND NOT (user_agent="*monitoring*" OR authenticated_user=*)

🔗 References

📤 Share & Export