cvelist/2018/9xxx/CVE-2018-9276.json

73 lines
2.1 KiB
JSON
Raw Normal View History

2018-04-04 14:04:03 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9276",
2018-07-02 12:04:16 -04:00
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
2018-04-04 14:04:03 -04:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2018-07-02 12:04:16 -04:00
"value" : "An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20180626 PRTG < 18.2.39 Command Injection",
"refsource" : "BUGTRAQ",
2018-10-09 15:05:48 -04:00
"url" : "http://www.securityfocus.com/archive/1/542103/100/0/threaded"
2018-07-02 12:04:16 -04:00
},
2019-03-12 06:10:06 -04:00
{
"name" : "46527",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46527/"
},
2018-07-02 12:04:16 -04:00
{
"name" : "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"
2018-04-04 14:04:03 -04:00
}
]
}
}