CVE-2023-31448

A path traversal vulnerability was identified in the HL7 sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the HL7 sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Configurations

Configuration 1 (hide)

cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad de path traversal en el sensor HL7 en PRTG 23.2.84.1566 y versiones anteriores donde un usuario autenticado con permisos de escritura podía engañar al sensor HL7 para que se comportara de forma diferente para archivos existentes y archivos no existentes. Esto hacía posible el path traversal, permitiendo al sensor ejecutar archivos fuera de la carpeta designada de sensores personalizados. La gravedad de esta vulnerabilidad es media y ha recibido una puntuación de 4,7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
References () https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 - Vendor Advisory () https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 - Vendor Advisory
References () https://www.paessler.com/prtg/history/stable - Release Notes () https://www.paessler.com/prtg/history/stable - Release Notes

Information

Published : 2023-08-09 12:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31448

Mitre link : CVE-2023-31448

CVE.ORG link : CVE-2023-31448


JSON object : View

Products Affected

paessler

  • prtg_network_monitor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')