CVE-2024-23116

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Centreon's updateLCARelation function allows authenticated remote attackers to execute arbitrary SQL commands, potentially leading to remote code execution. Attackers can leverage this to compromise affected Centreon installations and execute code with service account privileges. Organizations running vulnerable Centreon versions are affected.

💻 Affected Systems

Products:
  • Centreon
Versions: Specific versions not detailed in advisory; check vendor advisory for exact range
Operating Systems: Linux-based systems where Centreon is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default Centreon installations with default credentials could be vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Database compromise leading to data theft, privilege escalation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal service account privileges, and SQL injection protections in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Authentication required but SQL injection to RCE chain is well-documented; exploit likely to be developed quickly

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Centreon security advisory for specific patched version

Vendor Advisory: https://www.centreon.com/en/security/

Restart Required: Yes

Instructions:

1. Check Centreon security advisory for exact patch version
2. Backup Centreon installation and database
3. Apply Centreon update via package manager or manual update
4. Restart Centreon services
5. Verify patch application

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for the updateLCARelation function parameters

Not applicable - requires code modification

WAF Rule Implementation

all

Deploy web application firewall rules to detect and block SQL injection attempts

WAF-specific configuration commands

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Centreon from critical systems
  • Enforce strong authentication policies and monitor for brute force attempts

🔍 How to Verify

Check if Vulnerable:

Check Centreon version against vendor advisory; examine if updateLCARelation function lacks proper input sanitization

Check Version:

centreon -v or check Centreon web interface version information

Verify Fix Applied:

Verify Centreon version matches patched version in advisory; test SQL injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in Centreon logs
  • Multiple authentication attempts followed by updateLCARelation calls
  • Error messages containing SQL syntax

Network Indicators:

  • SQL injection patterns in HTTP POST requests to Centreon
  • Unusual outbound connections from Centreon server

SIEM Query:

source="centreon.log" AND ("updateLCARelation" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE"))

🔗 References

📤 Share & Export