XML external entity vulnerability in PRTG Network Monitor before 16.2.23.3077/3078 allows remote authenticated users to read arbitrary files by creating a new HTTP XML/REST Value sensor that accesses a crafted XML file.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.paessler.com/prtg/history/stable#16.2.23.3077 | VDB Entry |
https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.paessler.com/prtg/history/stable#16.2.23.3077 | VDB Entry |
Configurations
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.paessler.com/prtg/history/stable#16.2.23.3077 - VDB Entry |
Information
Published : 2017-01-23 21:59
Updated : 2024-11-21 02:37
NVD link : CVE-2015-7743
Mitre link : CVE-2015-7743
CVE.ORG link : CVE-2015-7743
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-611
Improper Restriction of XML External Entity Reference