First published: Thu Jun 06 2024(Updated: )
A host whitelist parser issue in the proxy service implemented in the GravityZone Update Server allows an attacker to cause a server-side request forgery. This issue only affects GravityZone Console versions before 6.38.1-2 that are running only on premise.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender GravityZone | <6.38.1-2 |
An automatic update to version GravityZone Console On-Premise 6.38.1-2 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4177 is considered a high severity vulnerability due to its potential for server-side request forgery.
To fix CVE-2024-4177, upgrade your Bitdefender GravityZone Console to version 6.38.1-2 or later.
CVE-2024-4177 affects all versions of GravityZone Console before 6.38.1-2 that are running on-premise.
CVE-2024-4177 is a host whitelist parser issue that allows for server-side request forgery.
CVE-2024-4177 can be exploited remotely since it involves a server-side request forgery vulnerability.