A command injection vulnerability was identified in PRTG 23.2.84.1566 and earlier versions in the HL7 sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References
| Link | Resource |
|---|---|
| https://www.paessler.com/prtg/history/stable | Release Notes |
| https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 | Vendor Advisory |
Configurations
Information
Published : 2023-08-09 12:15
Updated : 2023-08-16 12:15
NVD link : CVE-2023-32781
Mitre link : CVE-2023-32781
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
