Lucene search

K
cve[email protected]CVE-2023-51630
HistoryFeb 08, 2024 - 11:15 p.m.

CVE-2023-51630

2024-02-0823:15:09
CWE-79
web.nvd.nist.gov
15
cve-2023-51630
paessler
prtg network monitor
cross-site scripting
authentication bypass
vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system.
. Was ZDI-CAN-21182.

Affected configurations

Vulners
NVD
Node
paesslerprtg_network_monitorRange23.2.84.1566

CNA Affected

[
  {
    "vendor": "Paessler",
    "product": "PRTG Network Monitor",
    "versions": [
      {
        "version": "23.2.84.1566",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

Related for CVE-2023-51630