First published: Tue May 09 2023(Updated: )
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Avalanche | <=6.3.4.153 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28128 is a vulnerability in Avalanche versions 6.3.x and below that allows for unrestricted upload of files with dangerous types, potentially leading to remote code execution.
CVE-2023-28128 has a severity rating of 7.2 (high).
Avalanche versions 6.3.x and below, up to and including 6.3.4.153, are affected by CVE-2023-28128.
An attacker can exploit CVE-2023-28128 by uploading files with dangerous types, which can lead to remote code execution.
Yes, you can find more information about CVE-2023-28128 at the following links: [Link 1](http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html) and [Link 2](https://forums.ivanti.com/s/article/ZDI-CAN-17812-Ivanti-Avalanche-FileStoreConfig-Arbitrary-File-Upload-Remote-Code-Execution-Vulnerability?language=en_US).