An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.paessler.com/prtg/history/stable#21.1.66.1623 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:40:47.475Z
Reserved: 2021-02-15T00:00:00
Link: CVE-2021-27220

No data.

Status : Modified
Published: 2021-03-31T22:15:14.397
Modified: 2024-11-21T05:57:37.557
Link: CVE-2021-27220

No data.