CVE-2023-31452
CVSS V2 None
CVSS V3 None
Description
A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and earlier versions that allows remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigger the malicious request. This could force PRTG to execute different actions, such as creating new users. The severity of this vulnerability is high and received a score of 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overview
- CVE ID
- CVE-2023-31452
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2023-08-09T12:15:09
- Last Modified Date
- 2023-08-22T19:16:36
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* | 1 | OR | 23.3.86.1520 |
References
Reference URL | Reference Tags |
---|---|
https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 | Vendor Advisory |
https://www.paessler.com/prtg/history/prtg-23#23.3.86.1520 | |
https://www.paessler.com/prtg/history/stable | Release Notes |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-31452 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31452 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-09-06 03:22:25 | Added to TrackCVE | |||
2023-09-06 03:22:27 | Weakness Enumeration | new |