We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
Reserved 2024-05-14 | Published 2024-06-25 | Updated 2025-03-03 | Assigner ProgressSoftwareDate added 2025-03-03 | Due date 2025-03-24
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative
www.progress.com/network-monitoring
community.progress.com/...p-Gold-Security-Bulletin-June-2024
Support options