From 3b32de60be7a061dc8c6a2f1535ccc0a2f84f049 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 2 Sep 2021 18:25:16 +0530 Subject: [PATCH] Update CVE-2020-11547.yaml --- cves/2020/CVE-2020-11547.yaml | 21 ++++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/cves/2020/CVE-2020-11547.yaml b/cves/2020/CVE-2020-11547.yaml index a438eb3bb3..80fa059eb9 100644 --- a/cves/2020/CVE-2020-11547.yaml +++ b/cves/2020/CVE-2020-11547.yaml @@ -5,19 +5,30 @@ info: author: x6263 severity: medium description: PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself via an HTTP request. - reference: | - - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 + reference: - https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure - tags: cve,cve2020,network,prtg,information-disclosure + - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 + tags: cve,cve2020,prtg,disclosure requests: - method: GET path: - - "{{BaseURL}}/public/login.htm?type=probes/" + - "{{BaseURL}}/public/login.htm?type=probes" + - "{{BaseURL}}/public/login.htm?type=requests" + + req-condition: true + matchers-condition: and matchers: + - type: dsl + dsl: + - "contains((body_1), 'Probe #1') && contains((body_2), 'Configuration Requests Sent')" + part: body + - type: word words: - - "Probe" + - "prtg_network_monitor" + part: body + - type: status status: - 200