CVE-2024-5725

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in Centreon's initCurveList function allows authenticated remote attackers to execute arbitrary SQL commands, potentially leading to remote code execution as the apache user. It affects Centreon installations where attackers have valid credentials. The vulnerability stems from improper input validation in SQL query construction.

💻 Affected Systems

Products:
  • Centreon
Versions: Specific affected versions not explicitly stated in provided references; check vendor advisory for exact range
Operating Systems: Linux-based systems running Centreon
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit; affects web interface component of Centreon monitoring platform

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, data exfiltration, lateral movement within network, and persistent backdoor installation.

🟠

Likely Case

Database compromise leading to sensitive information disclosure, privilege escalation, and potential RCE if database permissions allow.

🟢

If Mitigated

Limited to authenticated users only, reducing attack surface; proper input validation would prevent exploitation entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication required but SQL injection to RCE chain is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Centreon security bulletin for specific patched versions

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744

Restart Required: Yes

Instructions:

1. Check current Centreon version. 2. Apply vendor-provided security patches. 3. Restart Centreon services. 4. Verify patch application.

🔧 Temporary Workarounds

Input Validation Enhancement

linux

Implement additional input validation for the initCurveList function parameters

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting Centreon endpoints

🧯 If You Can't Patch

  • Restrict network access to Centreon web interface to trusted IPs only
  • Implement strong authentication controls and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check Centreon version against vendor advisory; test for SQL injection in initCurveList function with authenticated session

Check Version:

Check Centreon web interface version or consult installation documentation

Verify Fix Applied:

Verify Centreon version is updated to patched version; test SQL injection attempts no longer succeed

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by SQL errors
  • Apache error logs showing SQL syntax errors

Network Indicators:

  • Unusual outbound connections from Centreon server
  • SQL injection patterns in HTTP requests to Centreon endpoints

SIEM Query:

source="centreon_logs" AND (message="SQL" OR message="injection" OR message="syntax")

🔗 References

📤 Share & Export