In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists. A specially crafted unauthenticated HTTP request to AppProfileImport can lead can lead to information disclosure.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.progress.com/network-monitoring | product |
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 | vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1932 | third party advisory exploit |