CVE-2024-35306

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on Pandora FMS servers by injecting malicious commands through HTTP requests to Ajax PHP files. It affects all Pandora FMS installations running versions 700 through 776. Attackers can gain complete control of affected systems.

💻 Affected Systems

Products:
  • Pandora FMS
Versions: 700 through 776
Operating Systems: All platforms running Pandora FMS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands as the web server user, potentially leading to data theft, ransomware deployment, lateral movement, and complete system takeover.

🟠

Likely Case

Remote code execution leading to web shell installation, credential harvesting, and backdoor persistence on vulnerable systems.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities are typically easy to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 777

Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/

Restart Required: Yes

Instructions:

1. Backup your Pandora FMS installation and database. 2. Download version 777 from the official Pandora FMS website. 3. Follow the official upgrade documentation to update to version 777. 4. Restart the Pandora FMS service and verify functionality.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Implement WAF rules to block suspicious command injection patterns in HTTP requests

Network Access Control

linux

Restrict access to Pandora FMS web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate vulnerable systems in a separate network segment with strict firewall rules
  • Implement application-level input validation and sanitization for all user inputs

🔍 How to Verify

Check if Vulnerable:

Check Pandora FMS version via web interface or configuration files. If version is between 700 and 776 inclusive, system is vulnerable.

Check Version:

grep version /var/www/html/pandora_console/include/config.php | head -1

Verify Fix Applied:

Verify version is 777 or higher and test that command injection attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Ajax PHP files
  • Commands like 'whoami', 'id', 'ls', 'cat' in URL parameters
  • Multiple failed command injection attempts

Network Indicators:

  • HTTP requests containing shell metacharacters (;, |, &, $, `)
  • Outbound connections from web server to unexpected destinations

SIEM Query:

source="web_access.log" AND (url="*ajax*" AND (param="*;*" OR param="*|*" OR param="*`*" OR param="*$(*"))

🔗 References

📤 Share & Export