id: CVE-2020-11547 info: name: PRTG Network Monitor <20.1.57.1745 - Information Disclosure author: x6263 severity: medium description: PRTG Network Monitor before 20.1.57.1745 is susceptible to information disclosure. An attacker can obtain information about probes running or the server itself via an HTTP request, thus potentially being able to modify data and/or execute unauthorized administrative operations in the context of the affected site. impact: | An attacker can exploit this vulnerability to gain sensitive information from the PRTG Network Monitor. remediation: | Upgrade PRTG Network Monitor to version 20.1.57.1745 or higher to mitigate the information disclosure vulnerability. reference: - https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure - https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2020-11547 cwe-id: CWE-306 epss-score: 0.0011 epss-percentile: 0.43845 cpe: cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: paessler product: "prtg_network_monitor" shodan-query: title:"prtg" tags: cve2020,cve,prtg,disclosure,paessler http: - method: GET path: - "{{BaseURL}}/public/login.htm?type=probes" - "{{BaseURL}}/public/login.htm?type=requests" - "{{BaseURL}}/public/login.htm?type=treestat" stop-at-first-match: true matchers-condition: and matchers: - type: dsl dsl: - "contains(body_1, 'Probe #1') && contains(body_2, 'Configuration Requests Sent')" - type: word part: body words: - "prtg_network_monitor" - "Probes" - "Groups" condition: or - type: status status: - 200 # digest: 4b0a004830460221008df0bfcc4444b28d5172631672bf9be907028f99aa494e74467e8cc3d9dd105d022100ec0b8c0b67cd81a831b709ad7d1a34d8bcf81857986e88f5acbbb57751cbe028:922c64590222798bb761d5b6d8e72950