CVE-2019-19699
Centreon vulnerability analysis and mitigation

Overview

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration. The vulnerability allows system compromise through apache crontab misconfiguration, enabling the apache user to modify an executable file executed by root at 22:30 every day (NVD).

Technical details

To exploit the vulnerability, an attacker must have Admin access to the Centreon Web Interface and create a custom command through main.php?p=60803&type=3. The attacker then needs to set the Pollers Post-Restart Command to this previously created command via main.php?p=60901&o=c&server_id=1. The exploit is triggered when exporting the Poller Configuration. The vulnerability has a CVSS v3.1 base score of 7.2 HIGH with vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

Successful exploitation of this vulnerability could lead to system compromise, allowing an attacker with admin access to execute arbitrary code with root privileges through the apache user (Github POC).

Mitigation and workarounds

The vulnerability was fixed in versions after Centreon 19.10. For affected versions, recommended mitigations include properly configuring file permissions and ownership for critical files, implementing strict access controls, and using sudo commands with specific script execution permissions (Github POC).

Community reactions

The vulnerability was discovered by security researchers SpengeSec (Guylian Dw) and TheCyberGeek (Matthew B). The discovery was announced on Twitter and detailed proof of concept was published on Github (Twitter Announcement).

Additional resources


SourceThis report was generated using AI

Related Centreon vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-3872HIGH7.2
  • CentreonCentreon
  • cpe:2.3:a:centreon:centreon
NoYesApr 24, 2025
CVE-2025-3767HIGH7.2
  • CentreonCentreon
  • cpe:2.3:a:centreon:centreon
NoYesApr 22, 2025
CVE-2024-45756HIGH7.2
  • CentreonCentreon
  • cpe:2.3:a:centreon:centreon
NoYesNov 25, 2024
CVE-2024-45755HIGH7.2
  • CentreonCentreon
  • cpe:2.3:a:centreon:centreon
NoYesNov 25, 2024
CVE-2024-45754HIGH7.2
  • CentreonCentreon
  • cpe:2.3:a:centreon:centreon
NoYesOct 11, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management