A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.paessler.com/prtg/history/stable | release notes vendor advisory |
https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ | third party advisory exploit |
https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html | third party advisory release notes |