Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmpq-jp35-g5hj

Опубликовано: 09 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a SQL Sensor. When creating this sensor, the user can set the SQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system. They will be transmitted over the internet to the attacker's machine.

An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a SQL Sensor. When creating this sensor, the user can set the SQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system. They will be transmitted over the internet to the attacker's machine.

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.7
nvd
больше 2 лет назад

A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-22