Today We will exploit a simple but Important Vulnerability in PRTG Network Monitor. It is the most commonly used software for the monitor and classify system conditions like bandwidth usage or uptime and collect statistics from miscellaneous hosts as switches, routers, servers and other devices and applications.
PRTG released a Patch fixing a vulnerability that could be exploited to obtain information about probes running or the server itself.
CVE-2020-11547 has been assigned to this Information Disclosure Vulnerability.
PRTG Network Monitor before 188.8.131.525
How to Detect Vulnerability?
There are two ways to detect the vulnerability.
First one, the obvious one is to detect it with QualysGuard. Qualys has released QID 13711 to detect the bug.
And the second way is to exploit the vulnerability.
Let’s see, how to exploit this bug..
CVE-2020-11547 allows remote unauthenticated malicious users to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
It’s very simple, we will insert CPU usage, memory, Windows version one of these at the end of the URL in the type parameter.
here, I’ve given type=memory, PRTG server is showing the CPU load on the website.
3. type= cpuload
You can try to capture the same request in the Burpsuite
and it’s DONE!….. Like I said, Short and Sweet.
There is no workaround suggested by the vendor. Update your PRTG Network Monitor to 184.108.40.2065 or higher version.
To make your Lockdown days more interesting, Please Continue to Follow Qualys ThreatProtect.