First published: Fri Nov 22 2024(Updated: )
Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the extarctZippedFile [sic] method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22504.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Alltena Allegra | <7.5.1 | |
Allegro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51640 is rated as critical due to its potential for remote code execution.
To mitigate CVE-2023-51640, update Allegra to the latest version beyond 7.5.1 to address the vulnerability.
CVE-2023-51640 allows attackers to perform remote code execution by exploiting a directory traversal flaw.
Yes, CVE-2023-51640 requires authentication to exploit the vulnerability.
CVE-2023-51640 affects Allegra versions prior to 7.5.1.