CVE-2018-19410

PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including...

Basic Information

CVE State
PUBLISHED
Reserved Date
November 21, 2018
Published Date
November 21, 2018
Last Updated
February 04, 2025
Vendor
Paessler
Product
PRTG Network Monitor
Description
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Tags
cisa nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-02-04 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-01-25 07:20:19 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2025-02-04 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

himash/CVE-2018-19410-POC

Type: github • Created: 2024-01-25 07:20:19 UTC • Stars: 2

Proof of concept for the vulnerability CVE-2018-19410

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Added to KEVIntel

  • Detected by Nuclei