First published: Thu Aug 22 2024(Updated: )
The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Versa Networks Versa Director | ||
Versa Networks Versa Director | =21.2.2 | |
Versa Networks Versa Director | =21.2.3 | |
Versa Networks Versa Director | =22.1.1 | |
Versa Networks Versa Director | =22.1.2 | |
Versa Networks Versa Director | =22.1.3 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39717 has been classified as a critical severity vulnerability due to its potential impact on the security of the Versa Director software.
To fix CVE-2024-39717, update the Versa Director software to version 22.1.3 or later, or to version 21.2.3 or later.
CVE-2024-39717 allows for the unrestricted upload of files that can be dangerous, including executable files when changing the favicon.
Administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges are directly affected by CVE-2024-39717.
Vulnerable versions of Versa Director include 21.2.2, 21.2.3, 22.1.1, 22.1.2, and 22.1.3 prior to the recommended updates.