First published: Fri Nov 22 2024(Updated: )
Allegra renderFieldMatch Deserialization of Unstrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The specific flaw exists within the renderFieldMatch method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22505.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Allegra Allegra | ||
Alltena Allegra | <7.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51641 has a high severity rating due to its potential for remote code execution.
To fix CVE-2023-51641, upgrade Allegra to version 7.5.2 or later as per the vendor's recommendations.
CVE-2023-51641 affects Allegra versions prior to 7.5.2.
Yes, CVE-2023-51641 requires authentication to exploit the vulnerability.
CVE-2023-51641 is categorized as a deserialization of untrusted data vulnerability.