CVE-2025-4649

4.9 MEDIUM

📋 TL;DR

A privilege escalation vulnerability in Centreon web allows users with lower privileges to view event logs that should require high privileges. This occurs because Access Control Lists (ACLs) are not properly enforced on the event logs page. Affected users are those running vulnerable versions of Centreon web.

💻 Affected Systems

Products:
  • Centreon web
Versions: From 24.10.3 before 24.10.4, from 24.04.09 before 24.04.10, from 23.10.19 before 23.10.21, from 23.04.24 before 23.04.26
Operating Systems: Any OS running Centreon web
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated low-privilege user gains unauthorized access to sensitive event logs containing system information, configuration details, or security events, potentially enabling further attacks.

🟠

Likely Case

Low-privilege users can view audit logs and system events they shouldn't have access to, violating security boundaries and potentially exposing sensitive operational data.

🟢

If Mitigated

With proper network segmentation and monitoring, the impact is limited to unauthorized log viewing without direct system compromise.

🌐 Internet-Facing: MEDIUM - If Centreon web is exposed to the internet, authenticated attackers could exploit this to gain unauthorized log access.
🏢 Internal Only: MEDIUM - Internal users with any level of access could view logs beyond their authorization level.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but trivial to exploit once authenticated.

Exploitation requires authenticated access to the Centreon web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.4, 24.04.10, 23.10.21, 23.04.26

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/centreon-web-medium-severity-4349

Restart Required: Yes

Instructions:

1. Backup your Centreon installation. 2. Update to the patched version using your package manager (yum update centreon-web or apt upgrade centreon-web). 3. Restart Centreon services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Event Logs Page Access

linux

Temporarily restrict access to the event logs page via web server configuration or firewall rules.

# Example Apache mod_authz_core rule: <Location "/centreon/main.php?p=501"> Require valid-user Require group admin-group </Location>

🧯 If You Can't Patch

  • Implement strict network segmentation to limit Centreon web access to authorized users only.
  • Increase monitoring of event log access and implement alerting for unusual access patterns.

🔍 How to Verify

Check if Vulnerable:

Check Centreon web version via web interface (Administration > Parameters > Centreon) or command: rpm -q centreon-web or dpkg -l centreon-web

Check Version:

rpm -q centreon-web 2>/dev/null || dpkg -l centreon-web 2>/dev/null | grep centreon-web

Verify Fix Applied:

Verify version is updated to patched version and test that low-privilege users cannot access event logs page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to event logs page (main.php?p=501)
  • Users with non-admin roles accessing event logs

Network Indicators:

  • HTTP requests to /centreon/main.php?p=501 from non-admin users

SIEM Query:

source="centreon" AND (url="*main.php?p=501*" OR path="*main.php?p=501*") AND user_role!="admin"

🔗 References

📤 Share & Export