First published: Fri Nov 22 2024(Updated: )
Allegra getFileContentAsString Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the product implements a registration mechanism that can be used to create a new user with a sufficient privilege level. The specific flaw exists within the getFileContentAsString method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22530.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Alltena Allegra | <7.5.1 | |
Allegro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-51648 is considered to be high due to the potential information disclosure risks associated with it.
To fix CVE-2023-51648, update your Allegra installation to the latest version beyond 7.5.1 that provides the necessary security patches.
CVE-2023-51648 is classified as a directory traversal information disclosure vulnerability.
No, CVE-2023-51648 requires authentication to exploit, but it may still pose a significant risk if an attacker gains access.
CVE-2023-51648 affects Allegra versions prior to 7.5.1.