Advertisements

 Centreon File Inclusion and Cross-Site Scripting Vulnerabilities

Monday, 3 March 2008

Description:
Some vulnerabilities have been reported in Centreon, which can be exploited by malicious people to conduct cross-site scripting attacks or to disclose sensitive information.

1) Input passed to the "name" and "title" parameters in include/common/javascript/color_picker.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

2) Input passed to the "lang" and "img" parameters in include/doc/get_image.php, and to the "page" parameter in include/doc/index.php, is not properly verified before being used to read files. This can be exploited to disclose the content of arbitrary files via directory traversal attacks.

The vulnerabilities are reported in version 1.4.2.3. Prior versions may also be affected.

Solution:
Update to version 1.4.2.4.

Provided and/or discovered by:
1) Julien Cayssol
2) Julien Cayssol and Jose Luis Góngora Fernández

Changelog:
2008-03-03: Added the vulnerability affecting "include/doc/index.php". Updated credits, the "Solution" and the "Original Advisory" sections.

Original Advisory:
Centreon:
http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html
http://secunia.com/advisories/29158/
http://seclists.org/bugtraq/2008/Feb/0451.html



Share this content:
        
Advertisements
Home | News | Articles | Advisories | Submit | Alerts | Links | What is XSS | About | Contact | Some Rights Reserved.