CVE-2018-9276

An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
References
Link Resource
http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html Exploit Mitigation Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/542103/100/0/threaded Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46527/ Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

Information

Published : 2018-07-02 09:29

Updated : 2021-04-12 06:42


NVD link : CVE-2018-9276

Mitre link : CVE-2018-9276


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

paessler

  • prtg_network_monitor