First published: Wed Aug 09 2023(Updated: )
A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <23.3.86.1520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31450 is a path traversal vulnerability identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions.
The path traversal vulnerability in CVE-2023-31450 allows an authenticated user with write permissions to trick the SQL v2 sensors into behaving differently for existing and non-existing files, enabling them to traverse paths.
The severity of CVE-2023-31450 is medium with a severity value of 4.7.
To fix the path traversal vulnerability in PRTG Network Monitor, you should upgrade to version 23.3.86.1520 or later.
You can find more information about CVE-2023-31450 on the Paessler knowledge base at https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 and on the Paessler website at https://www.paessler.com/prtg/history/stable.