A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
References
Link | Resource |
---|---|
https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ | Exploit Third Party Advisory |
https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/11/warnmeldung_cb-k19-1019.html | Third Party Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes |
Configurations
History
No history.
Information
Published : 2020-03-16 19:15
Updated : 2024-02-04 21:00
NVD link : CVE-2019-11073
Mitre link : CVE-2019-11073
CVE.ORG link : CVE-2019-11073
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')