A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-08-09T00:00:00

Updated: 2024-10-10T16:18:37.823Z

Reserved: 2023-04-28T00:00:00

Link: CVE-2023-31449

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:31.077Z

cve-icon NVD

Status : Modified

Published: 2023-08-09T12:15:09.823

Modified: 2024-11-21T08:01:53.290

Link: CVE-2023-31449

cve-icon Redhat

No data.