An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html | Exploit Mitigation Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/542103/100/0/threaded | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46527/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-07-02 09:29
Updated : 2021-04-12 06:42
NVD link : CVE-2018-9276
Mitre link : CVE-2018-9276
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
paessler
- prtg_network_monitor