Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4883— WhatsUp Gold WriteDataFile Directory Traversal Remote Code Execution Vulnerability

CVSS 9.8 · Critical EPSS 92.24% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-4883

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
WhatsUp Gold WriteDataFile Directory Traversal Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Progress Software WhatsUp Gold 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Progress Software WhatsUp Gold是美国Progress Software公司的一款网络监控软件。用于监控整个网络基础设施以及应用程序、配置和网络流量。 Progress Software WhatsUp Gold 2023.1.3版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者通过 NmApi.exe 以服务帐户身份实现远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Progress Software CorporationWhatsUp Gold 2023.1.0 ~ 2023.1.3 -

II. Public POCs for CVE-2024-4883

#POC DescriptionSource LinkShenlong Link
1Exploit for CVE-2024-4883https://github.com/sinsinology/CVE-2024-4883POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-4883

登录查看更多情报信息。

Same Patch Batch · Progress Software Corporation · 2024-06-25 · 15 CVEs total

CVE-2024-48859.8 CRITICALWhatsUp Gold GetFileWithoutZip Directory Traversal Remote Code Execution Vulnerability
CVE-2024-48849.8 CRITICALWhatsUp Gold CommunityController Unrestricted File Upload Remote Code Execution Vulnerabil
CVE-2024-50088.8 HIGHWhatsUp Gold APM Unrestricted File Upload Remote Code Execution Vulnerability
CVE-2024-50128.6 HIGHWhatsUp Gold Missing Authentication GetWindowsCredential Information Disclosure Vulnerabil
CVE-2024-50098.4 HIGHWhatsUp Gold SetAdminPassword Improper Access Control Privilege Escalation Vulnerability
CVE-2024-50117.5 HIGHWhatsUp Gold TestController Chart denial of service vulnerability
CVE-2024-50137.5 HIGHWhatsUp Gold InstallController Denial-of-Service Vulnerability
CVE-2024-50107.5 HIGHWhatsUp Gold TestController multiple information disclosure vulnerabilities
CVE-2024-50167.2 HIGHWhatsUp Gold OnMessage Deserialization of Untrusted Data Remote Code Execution Vulnerabili
CVE-2024-50157.1 HIGHWhatsUp Gold SessionControler Server-Side Request Forgery Information Disclosure Vulnerabi
CVE-2024-50147.1 HIGHWhatsUp Gold GetASPReport Server-Side Request Forgery Information Disclosure
CVE-2024-50176.5 MEDIUMWhatsUp Gold AppProfileImport path traversal vulnerability
CVE-2024-50195.3 MEDIUMWhatsUp Gold LoadCSSUsingBasePath Directory Traversal Information Disclosure Vulnerability
CVE-2024-50185.3 MEDIUMWhatsUp Gold LoadUsingBasePath Directory Traversal Information Disclosure Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-4883

No comments yet


Leave a comment