CVE-2018-9276

An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
References
Link Resource
http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html Exploit Mitigation Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/542103/100/0/threaded Broken Link Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46527/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-02 16:29

Updated : 2024-02-28 16:25


NVD link : CVE-2018-9276

Mitre link : CVE-2018-9276

CVE.ORG link : CVE-2018-9276


JSON object : View

Products Affected

paessler

  • prtg_network_monitor
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')