A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
References
Link | Resource |
---|---|
https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html | Release Notes Third Party Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes Vendor Advisory |
https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-03-17 08:15
Updated : 2021-06-29 06:51
NVD link : CVE-2019-11074
Mitre link : CVE-2019-11074
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
paessler
- prtg_network_monitor