CVE-2023-41815
📋 TL;DR
This CVE describes a cross-site scripting (XSS) vulnerability in Pandora FMS that allows attackers to inject malicious scripts into the File Manager section. When exploited, this could enable session hijacking, credential theft, or unauthorized actions. All Pandora FMS installations from version 700 through 774 are affected.
💻 Affected Systems
- Pandora FMS
📦 What is this software?
Pandora Fms by Pandorafms
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of administrator accounts leading to full system takeover, data exfiltration, and lateral movement within the network.
Likely Case
Session hijacking of authenticated users, credential theft, and unauthorized file operations through the File Manager.
If Mitigated
Limited impact with proper input validation and output encoding, potentially only affecting the specific user session.
🎯 Exploit Status
XSS vulnerabilities are commonly weaponized, though this requires authenticated access to the File Manager section.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 775 and later
Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
Restart Required: Yes
Instructions:
1. Backup your current installation. 2. Download Pandora FMS version 775 or later from the official website. 3. Follow the upgrade instructions in the documentation. 4. Restart all Pandora FMS services.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation and output encoding for File Manager inputs
Requires custom code modifications to sanitize user inputs in the File Manager module
🧯 If You Can't Patch
- Restrict access to the File Manager section to only trusted administrators
- Implement a Web Application Firewall (WAF) with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check your Pandora FMS version via the web interface or configuration files. If version is between 700 and 774 inclusive, you are vulnerable.
Check Version:
Check /etc/pandora/pandora_server.conf or the About section in the web interface
Verify Fix Applied:
After upgrading to version 775 or later, verify the version number and test File Manager functionality for proper input sanitization.
📡 Detection & Monitoring
Log Indicators:
- Unusual file operations in File Manager logs
- Suspicious JavaScript payloads in access logs
Network Indicators:
- Unexpected JavaScript execution in File Manager requests
SIEM Query:
source="pandora_fms" AND ("File Manager" OR "file_manager") AND ("script" OR "javascript" OR "onerror" OR "onload")