First published: Wed Aug 09 2023(Updated: )
A path traversal vulnerability was identified in the HL7 sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the HL7 sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <23.3.86.1520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this path traversal vulnerability is CVE-2023-31448.
The severity of CVE-2023-31448 is medium with a severity value of 4.7.
The Paessler PRTG Network Monitor version up to 23.3.86.1520 is affected by CVE-2023-31448.
An authenticated user with write permissions can trick the HL7 sensor into behaving differently for existing and non-existing files, allowing path traversal.
Yes, fixes for CVE-2023-31448 are available in Paessler PRTG Network Monitor version 23.3.86.1520 and later.