PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.
References
Link Resource
https://raxis.com/blog/cve-2022-35739 Exploit Third Party Advisory
https://www.paessler.com/prtg/history/stable Release Notes Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-25T00:00:00

Updated: 2022-10-27T00:00:00

Reserved: 2022-07-13T00:00:00


Link: CVE-2022-35739

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-10-25T17:15:54.467

Modified: 2023-08-08T14:21:49.707


Link: CVE-2022-35739

JSON object: View

cve-icon Redhat Information

No data.

CWE