Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED29001-6A06-457D-A606-E85C7600B6AD", "versionEndExcluding": "23.3.86.1520", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}, {"lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de path traversal en el sensor WMI Custom en PRTG 23.2.84.1566 y versiones anteriores donde un usuario autenticado con permisos de escritura pod\u00eda enga\u00f1ar al sensor WMI Custom para que se comportara de forma diferente para archivos existentes y archivos no existentes. Esto hac\u00eda posible el path traversal, permitiendo al sensor ejecutar archivos fuera de la carpeta de sensores personalizados designada. La gravedad de esta vulnerabilidad es media y ha recibido una puntuaci\u00f3n de 4,7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}], "id": "CVE-2023-31449", "lastModified": "2024-11-21T08:01:53.290", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-08-09T12:15:09.823", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520"}, {"source": "cve@mitre.org", "tags": ["Release Notes"], "url": "https://www.paessler.com/prtg/history/stable"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"], "url": "https://www.paessler.com/prtg/history/stable"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}