Количество 3
Количество 3
CVE-2018-19410
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
GHSA-pm93-g4gf-j42f
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
BDU:2018-01538
Уязвимость сетевого программного обеспечения для мониторинга сети PRTG Network Monitor, связанная с небезопасным управлением привилегиями, позволяющая нарушителю, создавать пользователей с привилегиями «чтение-запись»
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-19410 PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator). | CVSS3: 9.8 | 92% Критический | около 7 лет назад | |
GHSA-pm93-g4gf-j42f PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator). | CVSS3: 9.8 | 92% Критический | больше 3 лет назад | |
BDU:2018-01538 Уязвимость сетевого программного обеспечения для мониторинга сети PRTG Network Monitor, связанная с небезопасным управлением привилегиями, позволяющая нарушителю, создавать пользователей с привилегиями «чтение-запись» | CVSS3: 9.8 | 92% Критический | почти 8 лет назад |
Уязвимостей на страницу