CVE-2024-35308
📋 TL;DR
This vulnerability allows authenticated attackers to read arbitrary files on Pandora FMS servers through the plugin edition feature. It affects Pandora FMS versions 700 through 777.2, potentially exposing sensitive configuration files, credentials, or system data.
💻 Affected Systems
- Pandora FMS
📦 What is this software?
Pandora Fms by Pandorafms
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files like /etc/passwd, /etc/shadow, configuration files containing database credentials, or private keys, leading to full system compromise.
Likely Case
Authenticated users or attackers who gain credentials could exfiltrate sensitive configuration data, potentially enabling further attacks or data breaches.
If Mitigated
With proper access controls and network segmentation, impact is limited to the Pandora FMS application server only.
🎯 Exploit Status
Post-authentication vulnerability requiring valid credentials. Path traversal techniques likely involved.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 777.3
Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
Restart Required: Yes
Instructions:
1. Backup your Pandora FMS installation and database. 2. Download version 777.3 from official sources. 3. Follow the Pandora FMS upgrade documentation. 4. Restart Pandora FMS services.
🔧 Temporary Workarounds
Disable Plugin Edition Feature
allTemporarily disable the vulnerable plugin edition functionality
# Modify Pandora FMS configuration to restrict plugin management
Restrict Access to Admin Interface
allLimit access to Pandora FMS admin interface to trusted IPs only
# Configure firewall rules or web server access controls
🧯 If You Can't Patch
- Implement strict access controls and network segmentation for Pandora FMS servers
- Monitor for unusual file access patterns and implement file integrity monitoring
🔍 How to Verify
Check if Vulnerable:
Check Pandora FMS version via web interface or console. Versions 700-777.2 are vulnerable.
Check Version:
pandora_console --version or check web interface About page
Verify Fix Applied:
Verify version is 777.3 or later and test plugin edition functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in plugin logs
- Multiple failed authentication attempts followed by plugin access
Network Indicators:
- Unusual outbound data transfers from Pandora FMS server
- Requests to plugin endpoints with path traversal patterns
SIEM Query:
source="pandora_fms" AND (event="plugin_edit" OR event="file_read") AND path CONTAINS ".."