CVE-2023-41790
📋 TL;DR
This vulnerability allows attackers to manipulate Pandora FMS's configuration file search paths, potentially accessing the server configuration file and compromising the database. It affects all Pandora FMS installations running versions 700 through 773.
💻 Affected Systems
- Pandora FMS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise leading to data theft, system takeover, and lateral movement within the network.
Likely Case
Unauthorized access to sensitive configuration data and database credentials, enabling further exploitation.
If Mitigated
Limited impact if proper file permissions and network segmentation are implemented.
🎯 Exploit Status
Exploitation requires understanding of Pandora FMS's file structure and search path manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 774 or later
Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
Restart Required: Yes
Instructions:
1. Backup your current installation. 2. Download version 774 or later from the official Pandora FMS website. 3. Follow the upgrade instructions in the documentation. 4. Restart the Pandora FMS services.
🔧 Temporary Workarounds
Restrict File Permissions
linuxSet strict file permissions on configuration files to prevent unauthorized access.
chmod 600 /etc/pandora/pandora_server.conf
chown root:root /etc/pandora/pandora_server.conf
Network Segmentation
allIsolate Pandora FMS servers from untrusted networks and limit access to trusted IPs only.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the Pandora FMS server.
- Monitor file access logs for unauthorized attempts to read configuration files.
🔍 How to Verify
Check if Vulnerable:
Check the Pandora FMS version via the web interface or by examining the installation directory.
Check Version:
grep 'version' /usr/share/pandora_server/PANDORA_VERSION.def 2>/dev/null || echo 'Check web interface'
Verify Fix Applied:
Confirm the version is 774 or higher and test that configuration files cannot be accessed via unauthorized paths.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns to configuration files
- Failed authentication attempts followed by configuration file access
Network Indicators:
- Unexpected connections to Pandora FMS ports from untrusted sources
SIEM Query:
source="pandora.log" AND (event="config_access" OR file_path="/etc/pandora/*")