CVE-2023-4677

7.0 HIGH

📋 TL;DR

This vulnerability allows attackers to obtain administrator session IDs from cron log backup files in Pandora FMS. By accessing these files, attackers can authenticate to the application as administrators without proper credentials. This affects all Pandora FMS installations up to version 772.

💻 Affected Systems

Products:
  • Pandora FMS
Versions: <= 772
Operating Systems: All platforms running Pandora FMS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the cron log backup functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Pandora FMS console, allowing attackers to execute arbitrary commands, access sensitive monitoring data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized administrative access to the monitoring system, enabling data theft, configuration changes, and disruption of monitoring services.

🟢

If Mitigated

Limited impact if proper access controls prevent directory traversal and file access by unauthorized users.

🌐 Internet-Facing: HIGH - Any internet-facing Pandora FMS console with vulnerable versions is at immediate risk of exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires directory traversal access to the cron logs directory, which is typically accessible to any user who can reach the Pandora FMS console.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 773 and later

Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/

Restart Required: Yes

Instructions:

1. Backup your current Pandora FMS installation. 2. Download version 773 or later from the official Pandora FMS website. 3. Follow the upgrade instructions in the Pandora FMS documentation. 4. Restart all Pandora FMS services after upgrade.

🔧 Temporary Workarounds

Restrict access to cron log directory

linux

Modify file permissions to prevent unauthorized access to cron log backup files

chmod 600 /var/log/pandora/cron/*.log
chown root:root /var/log/pandora/cron/*.log

Disable cron log backups

all

Modify cron configuration to prevent creation of log backup files containing session IDs

Edit cron configuration to remove or modify logging that captures session data

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Pandora FMS console
  • Regularly monitor and delete cron log backup files containing sensitive session data

🔍 How to Verify

Check if Vulnerable:

Check Pandora FMS version: grep 'version' /usr/share/pandora_server/lib/PandoraFMS/Config.pm | grep -o '[0-9]\+'

Check Version:

grep 'version' /usr/share/pandora_server/lib/PandoraFMS/Config.pm

Verify Fix Applied:

Verify version is 773 or higher and check that cron log files no longer contain session IDs: grep -r 'session_id' /var/log/pandora/cron/

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to cron log directories
  • Multiple failed login attempts followed by successful admin login from unusual IP

Network Indicators:

  • Unusual HTTP requests to cron log file paths
  • Administrative actions from non-admin IP addresses

SIEM Query:

source="pandora_fms" AND (path="*/cron/*.log" OR action="admin_login") | stats count by src_ip, user

🔗 References

📤 Share & Export