CVE-2023-51630

Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-21182.
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-24-073/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-24-073/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:38

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - Third Party Advisory, VDB Entry

15 Feb 2024, 17:15

Type Values Removed Values Added
First Time Paessler prtg Network Monitor
Paessler
CWE CWE-79
References () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-073/ - Third Party Advisory, VDB Entry
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*

08 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-08 23:15

Updated : 2024-11-21 08:38


NVD link : CVE-2023-51630

Mitre link : CVE-2023-51630

CVE.ORG link : CVE-2023-51630


JSON object : View

Products Affected

paessler

  • prtg_network_monitor
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')