CVE-2018-19204
moderate-risk
Published 2018-11-12
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
http://en.securitylab.ru/lab/PT-2018-23
Vendor Advisory
https://www.paessler.com/prtg/history/stable#18.3.44.2054
Third Party Advisory
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-23/
Third Party Advisory
http://en.securitylab.ru/lab/PT-2018-23
Vendor Advisory
https://www.paessler.com/prtg/history/stable#18.3.44.2054
Third Party Advisory
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-23/
39
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal