A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.paessler.com/prtg/history/stable#20.1.57.1745 | vendor advisory |
https://kb.paessler.com/en/topic/87668-how-can-i-mitigate-cve-2020-10374-until-i-can-update | mitigation vendor advisory |
https://tehtris.com/en/rce-on-prtg-network-monitor-tehtris-pentest/ |