A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
References
Link | Resource |
---|---|
https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html | Release Notes Third Party Advisory |
https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ | Exploit Third Party Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes Vendor Advisory |
Configurations
History
29 Jun 2021, 13:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* |
Information
Published : 2020-03-17 15:15
Updated : 2024-02-04 21:00
NVD link : CVE-2019-11074
Mitre link : CVE-2019-11074
CVE.ORG link : CVE-2019-11074
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type