First published: Fri Feb 09 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The specific flaw exists within the loadFieldMatch method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE.
Affected Software | Affected Version | How to fix |
---|---|---|
Allegro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-22506 has a high severity rating, indicating a significant risk due to the potential for remote code execution.
To fix ZDI-CAN-22506, ensure that you apply the latest security patches or updates provided by Allegra.
ZDI-CAN-22506 affects installations of Allegra that have not been updated to the version which addresses this vulnerability.
Yes, authentication is required to exploit ZDI-CAN-22506, but the vulnerability allows an attacker to create a privileged user.
If exploited, ZDI-CAN-22506 allows remote attackers to execute arbitrary code, potentially compromising the affected system.