First published: Wed Mar 06 2024(Updated: )
A vulnerability in the file upload functionality of Cisco AppDynamics Controller could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to access sensitive data on an affected device.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AppDynamics | ||
Cisco AppDynamics | <23.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20345 is classified as a high severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2024-20345, ensure that your Cisco AppDynamics Controller software is updated to the latest version that includes patches for this vulnerability.
CVE-2024-20345 can be exploited to conduct directory traversal attacks, allowing unauthorized access to the server's file system.
CVE-2024-20345 affects users of Cisco AppDynamics Controller that have the vulnerable file upload functionality.
Yes, CVE-2024-20345 can be exploited by authenticated remote attackers.