{"id":"CVE-2023-51633","details":"Centreon sysName Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. User interaction is required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of the sysName OID in SNMP. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-20731.","modified":"2026-04-12T08:24:19.892469Z","published":"2024-05-03T03:16:26.440Z","references":[{"type":"FIX","url":"https://www.zerodayinitiative.com/advisories/ZDI-24-416/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/centreon/centreon","events":[{"introduced":"0"},{"fixed":"ba1b1d5117096dde7a551a74aa460de1e34a2780"},{"introduced":"272591f468f73162aa9d790799d68db86648ac2e"},{"fixed":"55c0778ded0a9d41924fca12e938a1838d0bfb17"},{"introduced":"755448bcd365969a97e902b856a1e5f56d80adaa"},{"fixed":"b8a4dfdc986e2f0fccdcf88f1ba9525a5f425c84"}],"database_specific":{"cpe":"cpe:2.3:a:centreon:centreon_web:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"22.10.15"},{"introduced":"23.04.0"},{"fixed":"23.04.10"},{"introduced":"23.10.0"},{"fixed":"23.10.1"}],"source":"CPE_FIELD"}}],"versions":["centreon-awie-22.10.0","centreon-awie-23.04.0","centreon-awie-23.04.1","centreon-awie-23.10.0","centreon-dsm-22.10.0","centreon-dsm-22.10.1","centreon-dsm-23.04.0","centreon-dsm-23.04.1","centreon-dsm-23.04.2","centreon-dsm-23.10.0","centreon-dsm-23.10.1","centreon-gorgone-22.10.0","centreon-gorgone-22.10.1","centreon-gorgone-22.10.2","centreon-gorgone-23.04.0","centreon-gorgone-23.04.1","centreon-gorgone-23.04.2","centreon-gorgone-23.04.3","centreon-gorgone-23.04.4","centreon-gorgone-23.04.5","centreon-gorgone-23.04.6","centreon-gorgone-23.04.7","centreon-gorgone-23.10.0","centreon-gorgone-23.10.1","centreon-gorgone-23.10.2","centreon-gorgone-23.10.3","centreon-gorgone-23.10.5","centreon-gorgone-23.10.6","centreon-gorgone-23.10.7","centreon-gorgone-23.10.8","centreon-gorgone-23.10.9","centreon-ha-22.10.0","centreon-ha-22.10.1","centreon-ha-23.04.0","centreon-ha-23.10.0","centreon-open-tickets-22.10.0","centreon-open-tickets-22.10.1","centreon-open-tickets-22.10.2","centreon-open-tickets-23.04.0","centreon-open-tickets-23.04.1","centreon-open-tickets-23.04.2","centreon-open-tickets-23.10.0","centreon-open-tickets-23.10.1","centreon-open-tickets-23.10.2","centreon-web-22.10.10","centreon-web-22.10.11","centreon-web-22.10.12","centreon-web-22.10.13","centreon-web-22.10.14","centreon-web-22.10.2","centreon-web-22.10.3","centreon-web-22.10.4","centreon-web-22.10.5","centreon-web-22.10.6","centreon-web-22.10.7","centreon-web-22.10.8","centreon-web-22.10.9","centreon-web-23.04.0","centreon-web-23.04.1","centreon-web-23.04.2","centreon-web-23.04.3","centreon-web-23.04.4","centreon-web-23.04.5","centreon-web-23.04.6","centreon-web-23.04.7","centreon-web-23.04.8","centreon-web-23.04.9","centreon-web-23.10.0","centreon-web-23.10.1","centreon-web-23.10.11","centreon-web-23.10.12","centreon-web-23.10.13","centreon-web-23.10.14","centreon-web-23.10.15","centreon-web-23.10.16","centreon-web-23.10.17","centreon-web-23.10.18","centreon-web-23.10.19","centreon-web-23.10.2","centreon-web-23.10.3","centreon-web-23.10.4","centreon-web-23.10.5","centreon-web-23.10.6","centreon-web-23.10.7","centreon-web-23.10.8","centreon-web-23.10.9","centreon-widget-engine-status-22.10.0","centreon-widget-engine-status-23.04.0","centreon-widget-engine-status-23.10.0","centreon-widget-global-health-22.10.0","centreon-widget-global-health-23.04.0","centreon-widget-global-health-23.10.0","centreon-widget-graph-monitoring-22.10.0","centreon-widget-graph-monitoring-23.04.0","centreon-widget-graph-monitoring-23.10.0","centreon-widget-grid-map-22.10.0","centreon-widget-host-monitoring-22.10.0","centreon-widget-host-monitoring-23.04.0","centreon-widget-host-monitoring-23.10.0","centreon-widget-host-monitoring-23.10.1","centreon-widget-host-monitoring-23.10.2","centreon-widget-hostgroup-monitoring-22.10.0","centreon-widget-hostgroup-monitoring-23.04.0","centreon-widget-hostgroup-monitoring-23.10.0","centreon-widget-hostgroup-monitoring-23.10.1","centreon-widget-httploader-22.10.0","centreon-widget-httploader-23.04.0","centreon-widget-httploader-23.10.0","centreon-widget-live-top10-cpu-usage-22.10.0","centreon-widget-live-top10-cpu-usage-23.04.0","centreon-widget-live-top10-cpu-usage-23.10.0","centreon-widget-live-top10-cpu-usage-23.10.1","centreon-widget-live-top10-memory-usage-22.10.0","centreon-widget-live-top10-memory-usage-23.04.0","centreon-widget-live-top10-memory-usage-23.10.0","centreon-widget-live-top10-memory-usage-23.10.1","centreon-widget-ntopng-listing-22.10.0","centreon-widget-ntopng-listing-23.04.0","centreon-widget-ntopng-listing-23.10.0","centreon-widget-service-monitoring-22.10.0","centreon-widget-service-monitoring-22.10.2","centreon-widget-service-monitoring-23.04.0","centreon-widget-service-monitoring-23.10.0","centreon-widget-servicegroup-monitoring-22.10.0","centreon-widget-servicegroup-monitoring-23.04.0","centreon-widget-servicegroup-monitoring-23.10.0","centreon-widget-single-metric-22.10.0","centreon-widget-single-metric-23.04.0","centreon-widget-single-metric-23.10.0","centreon-widget-tactical-overview-22.10.0","centreon-widget-tactical-overview-23.04.0","centreon-widget-tactical-overview-23.10.0","js-config-22.10.3","js-config-22.10.4","ui-22.10.6","ui-22.10.7","ui-22.10.8","ui-context-22.10.2","ui-context-22.10.3","ui-context-22.10.4","ui-context-22.10.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-51633.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}