mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
30 lines
1.4 KiB
Markdown
30 lines
1.4 KiB
Markdown
![]() |
### [CVE-2018-9276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9276)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html
|
||
|
- http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html
|
||
|
- https://www.exploit-db.com/exploits/46527/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/A1vinSmith/CVE-2018-9276
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Desm0ndChan/OSCP-cheatsheet
|
||
|
- https://github.com/alvinsmith-eroad/CVE-2018-9276
|
||
|
- https://github.com/andyfeili/CVE-2018-9276
|
||
|
- https://github.com/chcx/PRTG-Network-Monitor-RCE
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/pdelteil/PRTG-Network-Monitor-RCE
|
||
|
- https://github.com/shk0x/PRTG-Network-Monitor-RCE
|
||
|
- https://github.com/wildkindcc/CVE-2018-9276
|
||
|
|