First published: Mon May 15 2006(Updated: )
Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain source code for scripts via a trailing dot in a request to NmConsole/Login.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp | =2006_premium | |
Ipswitch WhatsUp | =2006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2357 is considered a high severity vulnerability due to the potential for remote code exposure.
To fix CVE-2006-2357, ensure that you upgrade to the latest version of Ipswitch WhatsUp Professional that addresses this vulnerability.
CVE-2006-2357 could allow attackers to obtain sensitive source code from scripts, potentially leading to further exploitation.
CVE-2006-2357 affects Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium.
A potential workaround for CVE-2006-2357 would be to implement strict input validation to prevent requests with trailing dots.