First published: Fri Nov 22 2024(Updated: )
Allegra saveFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The specific flaw exists within the saveFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22548.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Allegra Allegra | ||
Alltena Allegra | <7.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52333 is classified as a high-severity vulnerability due to its potential for remote code execution.
CVE-2023-52333 can be exploited by remote attackers to execute arbitrary code on affected Allegra installations.
To fix CVE-2023-52333, users should update Allegra to the latest version that addresses this vulnerability.
Yes, some authentication is required to exploit CVE-2023-52333, which can limit the risk of unauthorized access.
CVE-2023-52333 affects Allegra versions prior to 7.5.1.