Description Preview
Overview
This vulnerability (CVE-2021-28053) is classified as CWE-89 (SQL Injection). The issue affects Centreon-Web in Centreon Platform 20.10.0, which is a monitoring solution used by many organizations to monitor their IT infrastructure. The vulnerability is located in the user management section of the application, specifically in the "Configuration > Users > Contacts / Users" area where additional information parameters can be manipulated to inject malicious SQL code. Since this vulnerability requires authentication, an attacker would need valid credentials to exploit it. However, once authenticated, they could potentially execute arbitrary SQL commands against the database, which might lead to unauthorized data access, data manipulation, or complete compromise of the database server.
Remediation
Organizations using affected versions of Centreon Platform should upgrade to version 20.04.13 or later, which contains fixes for this vulnerability. The patch is available in the 20.04.13 release as indicated in the references.
If immediate upgrading is not possible, consider implementing the following temporary mitigations:
- Restrict access to the Centreon administrative interface to trusted users only
- Implement network segmentation to limit access to the Centreon web interface
- Monitor database logs for suspicious SQL queries
- Implement additional access controls and input validation if possible
References
- Centreon Documentation: https://docs.centreon.com/current/en/
- Centreon GitHub Release (20.04.13 with fix): https://github.com/centreon/centreon/releases/tag/20.04.13
- RedShell Security Advisory: https://redshell.co
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade