First published: Mon Sep 13 2021(Updated: )
PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <21.3.69.1333 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29643 refers to a vulnerability in PRTG Network Monitor before version 21.3.69.1333 that allows stored cross-site scripting (XSS) attacks via an unsanitized string imported from a User Object in a connected Active Directory instance.
CVE-2021-29643 can allow attackers to perform stored XSS attacks, potentially leading to the execution of malicious code within the application.
The severity of CVE-2021-29643 is medium, with a CVSS score of 5.4.
To fix CVE-2021-29643, you should update your PRTG Network Monitor installation to version 21.3.69.1333 or above.
You can find more information about CVE-2021-29643 at the following references: [link1](https://raxis.com/blog/prtg-network-monitor-cve-2021-29643) and [link2](https://www.paessler.com/prtg/history/stable#21.3.69.1333).