First published: Tue Jun 25 2024(Updated: )
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory .
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <23.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5018 is classified as a critical vulnerability due to its potential for unauthorized file access.
To fix CVE-2024-5018, upgrade to WhatsUp Gold version 2023.1.3 or later.
CVE-2024-5018 allows attackers to perform a Path Traversal attack to read any file from the application's web-root directory.
CVE-2024-5018 affects all versions of WhatsUp Gold prior to 2023.1.3.
No, CVE-2024-5018 can be exploited without authentication.