First published: Wed Sep 23 2020(Updated: )
Unathenticated directory traversal in the ReceiverServlet class doPost() method can lead to arbitrary remote code execution in HPE Pay Per Use (PPU) Utility Computing Service (UCS) Meter version 1.9.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HPE Utility Computing Service Meter | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24626 is classified as critical due to the potential for arbitrary remote code execution.
To mitigate CVE-2020-24626, upgrade HPE Pay Per Use Utility Computing Service Meter to version 1.9 or apply recommended security patches.
CVE-2020-24626 specifically affects HPE Pay Per Use Utility Computing Service Meter version 1.9.
CVE-2020-24626 is a directory traversal vulnerability that can lead to remote code execution.
CVE-2020-24626 can be exploited without authentication, making it particularly dangerous.