PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.
References
Link | Resource |
---|---|
https://raxis.com/blog/cve-2022-35739 | Exploit Third Party Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-25T00:00:00
Updated: 2022-10-27T00:00:00
Reserved: 2022-07-13T00:00:00
Link: CVE-2022-35739
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-10-25T17:15:54.467
Modified: 2023-08-08T14:21:49.707
Link: CVE-2022-35739
JSON object: View
Redhat Information
No data.
CWE