Skip to content

Commit 76fb34a

Browse files
committed
small update in description of the module and documentation
1 parent 8a72fd6 commit 76fb34a

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

documentation/modules/exploit/linux/http/pandora_fms_auth_rce_cve_2024_12971.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ Pandora FMS is a monitoring solution that provides full observability for your o
33
This module exploits an command injection vulnerability in the `chromium-path` or `phantomjs-bin` directory
44
setting at the application settings page of Pandora FMS.
55
You need have admin access at the Pandora FMS Web application in order to execute this RCE.
6-
This access can be achieved leveraging a default password vulnerability in Pandora FMS that allows an attacker
7-
to access the Pandora FMS MySQL database, create a new admin user and gain administrative access to the Pandora FMS
8-
Web application.
6+
This access can be achieved by knowing the admin credentials to access the web application or leveraging a default
7+
password vulnerability in Pandora FMS that allows an attacker to access the Pandora FMS MySQL database,
8+
create a new admin user and gain administrative access to the Pandora FMS Web application.
99
This attack can be remotely executed over the WAN as long as the MySQL services are exposed to the outside world.
1010
This issue affects Community, Free and Enterprise editions:
1111
- chromium-path: from v7.0NG.768 through <= v7.0NG.780

modules/exploits/linux/http/pandora_fms_auth_rce_cve_2024_12971.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,11 @@ def initialize(info = {})
2727
technology. This module exploits an command injection vulnerability in the `chromium-path` or
2828
`phantomjs-bin` directory setting at the application settings page of Pandora FMS.
2929
You need have admin access at the Pandora FMS Web application in order to execute this RCE.
30-
This access can be achieved leveraging a default password vulnerability in Pandora FMS that
31-
allows an attacker to access the Pandora FMS MySQL database, create a new admin user and gain
32-
administrative access to the Pandora FMS Web application. This attack can be remotely executed
33-
over the WAN as long as the MySQL services are exposed to the outside world.
30+
This access can be achieved by knowing the admin credentials to access the web application or
31+
leveraging a default password vulnerability in Pandora FMS that allows an attacker to access
32+
the Pandora FMS MySQL database, create a new admin user and gain administrative access to the
33+
Pandora FMS Web application. This attack can be remotely executed over the WAN as long as the
34+
MySQL services are exposed to the outside world.
3435
This issue affects Community, Free and Enterprise editions:
3536
- chromium-path: from v7.0NG.768 through <= v7.0NG.780
3637
- phantomjs-bin: from v7.0NG.724 through <= v7.0NG.767

0 commit comments

Comments
 (0)