First published: Tue May 01 2018(Updated: )
A Code Injection issue was discovered in DlgSelectMibFile.asp in Ipswitch WhatsUp Gold before 2018 (18.0). Malicious actors can inject a specially crafted SNMP MIB file that could allow them to execute arbitrary commands and code on the WhatsUp Gold server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | <18.0 | |
Progress WhatsUp Gold | <18.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this code injection issue is CVE-2018-8938.
The severity rating of CVE-2018-8938 is critical (9.8).
Ipswitch WhatsUp Gold version up to (but not including) 18.0 is affected by this vulnerability.
Exploiting this code injection vulnerability can allow malicious actors to execute arbitrary commands and code on the WhatsUp Gold server.
You can find more information about this vulnerability at the following link: [https://docs.ipswitch.com/NM/WhatsUpGold2018/01_ReleaseNotes/index.htm](https://docs.ipswitch.com/NM/WhatsUpGold2018/01_ReleaseNotes/index.htm)