CVE-2019-17645

7.5 HIGH

📋 TL;DR

This vulnerability in Centreon monitoring software allows unauthenticated attackers to access sensitive configuration information via a direct request to a specific PHP file. Affected organizations are those running vulnerable Centreon versions without proper access controls.

💻 Affected Systems

Products:
  • Centreon
Versions: All versions before 2.8.31, 18.10.9, 19.04.6, and 19.10.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Centreon monitoring platform.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain sensitive configuration data including service credentials, monitoring parameters, and system information that could lead to further compromise of the monitoring infrastructure.

🟠

Likely Case

Information disclosure of monitoring configuration details, potentially exposing internal network structure and service dependencies.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the Centreon web interface.

🌐 Internet-Facing: HIGH - Direct unauthenticated access to sensitive information from internet-facing instances.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still access sensitive configuration data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to the vulnerable endpoint can trigger the information disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.31, 18.10.9, 19.04.6, or 19.10.3 depending on your version track

Vendor Advisory: https://documentation.centreon.com/docs/centreon/en/latest/release_notes/

Restart Required: Yes

Instructions:

1. Identify your Centreon version. 2. Backup your configuration. 3. Update to the patched version for your track. 4. Restart Centreon services. 5. Verify the fix.

🔧 Temporary Workarounds

Block direct access to vulnerable endpoint

linux

Use web server configuration to block access to the specific vulnerable PHP file

# For Apache: Add to .htaccess or virtual host config
<Files "refreshMacroAjax.php">
    Require all denied
</Files>
# For Nginx: Add to server block
location ~ /include/configuration/configObject/service/refreshMacroAjax\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict network access controls to limit Centreon web interface access to authorized users only
  • Monitor access logs for requests to the vulnerable endpoint and investigate any unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access https://[centreon-server]/centreon/include/configuration/configObject/service/refreshMacroAjax.php without authentication. If it returns configuration data, the system is vulnerable.

Check Version:

Check Centreon web interface login page footer or run: rpm -qa | grep centreon-web

Verify Fix Applied:

After patching, attempt the same access and verify you receive an authentication prompt or access denied error instead of configuration data.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /include/configuration/configObject/service/refreshMacroAjax.php from unauthenticated sources
  • Unusual access patterns to Centreon configuration endpoints

Network Indicators:

  • Unusual HTTP traffic to Centreon web interface from unexpected sources
  • Information disclosure in HTTP responses

SIEM Query:

web_access_logs WHERE url_path LIKE '%refreshMacroAjax.php%' AND auth_status = 'unauthenticated'

🔗 References

📤 Share & Export