Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p8j9-f8ph-95mf

Опубликовано: 09 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a HL7 Sensor. When creating this sensor, the user can set the HL7 message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.

An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a HL7 Sensor. When creating this sensor, the user can set the HL7 message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.7
nvd
больше 2 лет назад

A path traversal vulnerability was identified in the HL7 sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the HL7 sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-22