CVE-2015-1561:
Centreon Command Injection
8.6
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/14/2022
Updated
8/2/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
centreon/centreon | composer | < 2.8.28 | 2.8.28 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the escape_command
function's regex pattern. The original regex /(\\\$|
)/only matched literal
$(backslash + dollar) or backticks, but failed to handle standalone
$,
|, or other shell metacharacters. The corrected regex
/[\$|]/
uses a character class to sanitize individual dangerous characters. The function's improper filtering allowed command injection via the ns_id
parameter, as confirmed by the CVE description, commit diff, and exploit examples (e.g., %26 touch /tmp/das %26
bypassing sanitization).