Vulnerability Details : CVE-2019-11074
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
Products affected by CVE-2019-11074
- cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11074
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-11074
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11074
-
https://www.paessler.com/prtg/history/stable
Paessler AG - Version HistoryRelease Notes;Vendor Advisory
-
https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/
SensePost | Being stubborn pays off pt. 1 – cve-2018-19204Exploit;Third Party Advisory
-
https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html
how2itsec: Security fixes in PRTG 19.3.51/19.4.52Release Notes;Third Party Advisory
Jump to