Skip to content

Commit ce841e5

Browse files
committed
Rephrase about centreon.session
1 parent 889045d commit ce841e5

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

modules/exploits/linux/http/centreon_sqli_exec.rb

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,13 @@ def initialize(info = {})
1515
'Name' => 'Centreon SQL and Command Injection',
1616
'Description' => %q{
1717
This module exploits several vulnerabilities on Centreon 2.5.1 and prior and Centreon
18-
Enterprise Server 2.2 and prior. The combination of both vulnerabilities, SQL and
19-
Command injections in the displayServiceStatus.php component, allows remote attackers
20-
to execute arbitrary commands. No authentication is required. The module only requires
21-
a valid session available at the moment of exploitation. It means a legit ust must be
22-
logged in. This module has been tested successfully on Centreon Enterprise Server 2.2.
18+
Enterprise Server 2.2 and prior. Due to a combination of SQL injection and command
19+
injection in the displayServiceStatus.php component, it is possible to execute arbitrary
20+
commands as long as there is a valid session registered in the centreon.session table.
21+
In order to have a valid session, all it takes is a successful login from anybody.
22+
The exploit itself does not require any authentication.
23+
24+
This module has been tested successfully on Centreon Enterprise Server 2.2.
2325
},
2426
'License' => MSF_LICENSE,
2527
'Author' =>
@@ -86,7 +88,7 @@ def exploit
8688
if check == Exploit::CheckCode::Safe
8789
fail_with(Failure::NotVulnerable, "#{peer} - The SQLi cannot be exploited")
8890
elsif check == Exploit::CheckCode::Detected
89-
fail_with(Failure::Unknown, "#{peer} - The SQLi cannot be exploited. Centreon needs at least one successful login record to become exploitable. Perhaps try later?")
91+
fail_with(Failure::Unknown, "#{peer} - The SQLi cannot be exploited. Possibly because there's nothing in the centreon.session table. Perhaps try again later?")
9092
end
9193

9294
print_status("#{peer} - Exploiting...")

0 commit comments

Comments
 (0)