
Cloud Vulnerability DB
A community-led vulnerabilities database
Centreon v20.10.18 was discovered to contain a SQL injection vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations (Security Tracker).
The vulnerability exists in the Configuration/Notifications/Escalations functionality where the esc_name (Escalation Name) parameter is not properly sanitized before being used in SQL queries. This allows for SQL injection attacks by manipulating the parameter input (Security Tracker).
A successful exploitation of this vulnerability could allow attackers to execute arbitrary SQL commands on the affected system, potentially leading to unauthorized access to or modification of the database (Security Tracker).
Users should upgrade to a version newer than Centreon v20.10.18 that contains patches for this vulnerability (Security Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."