Skip to main content

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Severity High
Score 8.8/10


The package centreon/centreon is vulnerable to SQL Injection. This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. A specific flaw exists within the handling of requests to modify the poller broker configuration. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator. This vulnerability affects centreon/centreon versions prior to 21.04.19, 21.10.x prior to 21.10.11, and 22.04.x prior to 22.04.6. This vulnerability was assigned as ZDI-CAN-18557. This has the same fix as CVE-2022-42424, CVE-2022-42425, CVE-2022-42426, CVE-2022-42428 and CVE-2022-41142.

  • LOW
  • HIGH
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-89 - SQL Injection

Structured Query Language (SQL) injection attacks are one of the most common types of vulnerabilities. They exploit weaknesses in vulnerable applications to gain unauthorized access to backend databases. This often occurs when an attacker enters unexpected SQL syntax in an input field. The resulting SQL statement behaves in the background in an unintended manner, which allows the possibility of unauthorized data retrieval, data modification, execution of database administration operations, and execution of commands on the operating system.

Advisory Timeline

  • Published