CVE-2023-51630

Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-21182.
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-24-073/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

History

15 Feb 2024, 17:15

Type Values Removed Values Added
CWE CWE-79
First Time Paessler
Paessler prtg Network Monitor
CPE cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - Third Party Advisory, VDB Entry

08 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-08 23:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-51630

Mitre link : CVE-2023-51630

CVE.ORG link : CVE-2023-51630


JSON object : View

Products Affected

paessler

  • prtg_network_monitor
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')