Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5009— WhatsUp Gold SetAdminPassword Improper Access Control Privilege Escalation Vulnerability

CVSS 8.4 · High EPSS 36.01% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-5009

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
WhatsUp Gold SetAdminPassword Improper Access Control Privilege Escalation Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
In WhatsUp Gold versions released before 2023.1.3, an Improper Access Control vulnerability in Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权管理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Progress Software WhatsUp Gold 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Progress Software WhatsUp Gold是美国Progress Software公司的一款网络监控软件。用于监控整个网络基础设施以及应用程序、配置和网络流量。 Progress Software WhatsUp Gold 2023.1.3版本存在安全漏洞,该漏洞源于 Wug.UI.Controllers.InstallController.SetAdminPassword 中存在不当访问控制,允许本地攻击者修改管理员的密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Progress Software CorporationWhatsUp Gold 2023.1.0 ~ 2023.1.3 -

II. Public POCs for CVE-2024-5009

#POC DescriptionSource LinkShenlong Link
1Exploit for CVE-2024-5009https://github.com/sinsinology/CVE-2024-5009POC Details
2CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalationhttps://github.com/th3gokul/CVE-2024-5009POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-5009

登录查看更多情报信息。

Same Patch Batch · Progress Software Corporation · 2024-06-25 · 15 CVEs total

CVE-2024-48859.8 CRITICALWhatsUp Gold GetFileWithoutZip Directory Traversal Remote Code Execution Vulnerability
CVE-2024-48839.8 CRITICALWhatsUp Gold WriteDataFile Directory Traversal Remote Code Execution Vulnerability
CVE-2024-48849.8 CRITICALWhatsUp Gold CommunityController Unrestricted File Upload Remote Code Execution Vulnerabil
CVE-2024-50088.8 HIGHWhatsUp Gold APM Unrestricted File Upload Remote Code Execution Vulnerability
CVE-2024-50128.6 HIGHWhatsUp Gold Missing Authentication GetWindowsCredential Information Disclosure Vulnerabil
CVE-2024-50117.5 HIGHWhatsUp Gold TestController Chart denial of service vulnerability
CVE-2024-50137.5 HIGHWhatsUp Gold InstallController Denial-of-Service Vulnerability
CVE-2024-50107.5 HIGHWhatsUp Gold TestController multiple information disclosure vulnerabilities
CVE-2024-50167.2 HIGHWhatsUp Gold OnMessage Deserialization of Untrusted Data Remote Code Execution Vulnerabili
CVE-2024-50157.1 HIGHWhatsUp Gold SessionControler Server-Side Request Forgery Information Disclosure Vulnerabi
CVE-2024-50147.1 HIGHWhatsUp Gold GetASPReport Server-Side Request Forgery Information Disclosure
CVE-2024-50176.5 MEDIUMWhatsUp Gold AppProfileImport path traversal vulnerability
CVE-2024-50195.3 MEDIUMWhatsUp Gold LoadCSSUsingBasePath Directory Traversal Information Disclosure Vulnerability
CVE-2024-50185.3 MEDIUMWhatsUp Gold LoadUsingBasePath Directory Traversal Information Disclosure Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-5009

No comments yet


Leave a comment