(PT-2018-23) Positive Technologies Security Advisory
Remote Code Execution in PRTG Network Monitor
Vulnerable software
PRTG Network Monitor
Version: 18.3.43.2323 and earlier
Link:
https://www.paessler.com/prtg
Severity level
Severity level: High
Impact: Remote Code Execution
Access Vector: Remote
CVSS v3:
Base Score: 9.1
Vector: (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
CVE: CVE-2018-19204
Vulnerability description
The specialists of the Positive Research center have detected a Remote Code Execution vulnerability in PRTG Network Monitor.
Vulnerability due to improper handling of user input in the POST parameter 'proxyport_' allows remote authenticated attackers with read-write privileges to execute an arbitrary code and OS commands with system privileges. Using a specially crafted HTTP request an attacker can override the 'writeresult' command-line parameter for the HttpAdvancedSensor.exe executable file and write arbitrary data to an arbitrary file-system location, as demonstrated by creating an executable file in the \Custom Sensors\EXE directory and executing it through creation of EXE/Script Sensor.
How to fix
Update your software up to the latest version
Advisory status
25.05.2018 - Vendor gets vulnerability details
24.09.2018 - Vendor releases fixed version and details
25.10.2018 - Public disclosure
Credits
The vulnerability was detected by Anton Vaychikauskas, Dmitry Galecha, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2018-23
https://www.paessler.com/prtg/history/stable#18.3.44.2054
Reports on the vulnerabilities previously discovered by Positive Research:
https://www.ptsecurity.com/
https://en.securitylab.ru/lab/
About Positive Technologies
Positive Technologies is a leading digital security firm with over 15 years of experience in 360° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the company's research center—one of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.
Get in touch
will contact you shortly