CVE-2024-12971

8.8 HIGH

📋 TL;DR

This CVE allows attackers to execute arbitrary operating system commands on Pandora FMS servers by injecting malicious input into vulnerable parameters. It affects all Pandora FMS installations from version 700 through 777.6, potentially giving attackers full control over affected systems.

💻 Affected Systems

Products:
  • Pandora FMS
Versions: 700 through 777.6
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands as the web server user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attackers gain shell access to the Pandora FMS server, allowing them to read sensitive configuration files, modify monitoring data, or use the server as a pivot point for further attacks.

🟢

If Mitigated

With proper input validation and command sanitization, the vulnerability would be prevented, limiting attackers to legitimate application functionality.

🌐 Internet-Facing: HIGH - Pandora FMS web interfaces are often exposed to the internet for remote monitoring, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires finding vulnerable parameters and crafting appropriate command injection payloads. Authentication may be required depending on the specific vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 777.7 and later

Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/

Restart Required: No

Instructions:

1. Backup your current Pandora FMS installation and database. 2. Download the latest version from the official Pandora FMS website. 3. Follow the official upgrade guide for your specific version path. 4. Verify the upgrade was successful by checking the version number.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for all user-supplied parameters that could be used in system commands

Web Application Firewall Rules

all

Deploy WAF rules to block command injection patterns in HTTP requests

🧯 If You Can't Patch

  • Isolate Pandora FMS servers in a dedicated network segment with strict firewall rules limiting inbound and outbound connections
  • Implement network-based intrusion detection systems to monitor for command injection attempts and unusual outbound connections

🔍 How to Verify

Check if Vulnerable:

Check the Pandora FMS version via the web interface (Help → About) or by examining the /var/www/html/pandora_console/include/config.php file

Check Version:

grep 'version' /var/www/html/pandora_console/include/config.php | head -1

Verify Fix Applied:

Confirm the version is 777.7 or higher and test previously vulnerable endpoints with safe command injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed login attempts followed by successful access
  • Web server logs showing suspicious characters like ;, |, &, $, (, ) in URL parameters

Network Indicators:

  • Unexpected outbound connections from Pandora FMS servers
  • Traffic to known malicious IPs or domains
  • Unusual port activity from web server processes

SIEM Query:

source="pandora_access.log" AND (uri="*;*" OR uri="*|*" OR uri="*&*" OR uri="*$(*" OR uri="*`*")

🔗 References

📤 Share & Export