CVE-2024-4885: Progress Software WhatsUp Gold GetFileWithoutZip Directory Traversal – Remote Code Execution

CVE-2024-4885: Progress Software WhatsUp Gold GetFileWithoutZip Directory Traversal - Remote Code Execution-渗透云记 - 专注于网络安全与技术分享
CVE-2024-4885: Progress Software WhatsUp Gold GetFileWithoutZip Directory Traversal – Remote Code Execution
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2024-4885: Progress Software WhatsUp Gold GetFileWithoutZip Directory Traversal – Remote Code Execution

漏洞描述

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software WhatsUp Gold. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of GetFileWithoutZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享