Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-19410 PoC — Paessler PRTG Network Monitor 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Paessler PRTG Network Monitor 权限许可和访问控制问题漏洞 (CVE-2018-19410)
Description:Paessler PRTG Network Monitor是德国Paessler公司的一套网络监控软件。该软件提供使用情况的监测、数据包嗅探、深入分析和简明的报告等功能。 Paessler PRTG Network Monitor 18.2.40.1683之前版本中存在安全漏洞。远程攻击者可通过发送特制的HTTP请求并覆盖/public/login.htm文件中的‘include’指令的属性项。攻击者可借助‘id’和‘users’参数利用该漏洞创建带有读写权限的用户账户(包括管理员账户)。
Description
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
File Snapshot

id: CVE-2018-19410 info: name: PRTG Network Monitor - Local File Inclusion author: DhiyaneshDK ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.