Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2022-42424
Summary
The package centreon/centreon is vulnerable to SQL Injection. This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. A specific flaw exists within the handling of requests to modify the poller broker configuration. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator. This vulnerability affects centreon/centreon in versions prior to 21.04.19, 21.10.x prior to 21.10.11, and 22.04.x prior to 22.04.6. This issue was assigned the issue ID ZDI-CAN-18556. This has the same fix as CVE-2022-41142, CVE-2022-42425, CVE-2022-42426, CVE-2022-42428, and CVE-2022-42429.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- HIGH
CWE-89 - SQL Injection
Structured Query Language (SQL) injection attacks are one of the most common types of vulnerabilities. They exploit weaknesses in vulnerable applications to gain unauthorized access to backend databases. This often occurs when an attacker enters unexpected SQL syntax in an input field. The resulting SQL statement behaves in the background in an unintended manner, which allows the possibility of unauthorized data retrieval, data modification, execution of database administration operations, and execution of commands on the operating system.
References
Advisory Timeline
- Published