First published: Wed May 11 2022(Updated: )
In Progress Ipswitch WhatsUp Gold 21.1.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read the contents of a local file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | =21.1.0 | |
Ipswitch WhatsUp Gold | =21.1.1 | |
Ipswitch WhatsUp Gold | =22.0.0 | |
Progress WhatsUp Gold | =21.1.0 | |
Progress WhatsUp Gold | =21.1.1 | |
Progress WhatsUp Gold | =22.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29845 is a vulnerability in Ipswitch WhatsUp Gold 21.1.0 through 21.1.1 and 22.0.0 that allows an authenticated user to read the contents of a local file.
CVE-2022-29845 has a severity rating of 6.5, which is classified as medium.
An authenticated user can exploit CVE-2022-29845 by invoking an API transaction that allows them to read the contents of a local file.
CVE-2022-29845 affects Ipswitch WhatsUp Gold versions 21.1.0, 21.1.1, and 22.0.0.
Yes, you can refer to the following links for more information: [link1](https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022) and [link2](https://www.progress.com/network-monitoring).