First published: Wed Mar 31 2021(Updated: )
An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <21.1.66.1623 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-27220.
The severity of CVE-2021-27220 is medium (5.3).
An attacker can exploit CVE-2021-27220 by invoking the screenshot functionality with prepared context paths.
The software affected by CVE-2021-27220 is Paessler PRTG Network Monitor versions up to 21.1.66.1623.
A fix is available for CVE-2021-27220 in version 21.1.66.1623 of Paessler PRTG Network Monitor.