CVE-2023-31449

A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Configurations

Configuration 1 (hide)

cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad de path traversal en el sensor WMI Custom en PRTG 23.2.84.1566 y versiones anteriores donde un usuario autenticado con permisos de escritura podía engañar al sensor WMI Custom para que se comportara de forma diferente para archivos existentes y archivos no existentes. Esto hacía posible el path traversal, permitiendo al sensor ejecutar archivos fuera de la carpeta de sensores personalizados designada. La gravedad de esta vulnerabilidad es media y ha recibido una puntuación de 4,7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
References () https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 - Vendor Advisory () https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 - Vendor Advisory
References () https://www.paessler.com/prtg/history/stable - Release Notes () https://www.paessler.com/prtg/history/stable - Release Notes

Information

Published : 2023-08-09 12:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31449

Mitre link : CVE-2023-31449

CVE.ORG link : CVE-2023-31449


JSON object : View

Products Affected

paessler

  • prtg_network_monitor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')