THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-4885

WhatsUp Gold GetFileWithoutZip Directory Traversal Remote Code Execution Vulnerability

AssignerProgressSoftware
Reserved2024-05-14
Published2024-06-25
Updated2024-07-10

Description

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.



CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
affected

2023.1.0 before 2023.1.3
affected

Credits

Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative finder

References

https://www.progress.com/network-monitoring product

https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 vendor-advisory

cve.org CVE-2024-4885

nvd.nist.gov CVE-2024-4885

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-4885
© Copyright 2024 THREATINT. Made in Cyprus with +