CVE-2024-4883In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through
NmApi.exe.
CVE-2024-4884In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The
Apm.UI.Areas.APM.Controllers.CommunityController allows execution of commands with
iisapppool\nmconsole privileges.
CVE-2024-4885In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The
WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with
iisapppool\nmconsole privileges.
CVE-2024-5008In WhatsUp Gold versions released before 2023.1.3, an authenticated user with certain permissions can upload an arbitrary file and obtain RCE using
Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController.
CVE-2024-5009In WhatsUp Gold versions released before 2023.1.3, an Improper Access Control vulnerability in
Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password.
CVE-2024-5010In WhatsUp Gold versions released before 2023.1.3, a vulnerability exists in the TestController functionality. A specially crafted unauthenticated HTTP request can lead to a disclosure of sensitive information.
CVE-2024-5011In WhatsUp Gold versions released before 2023.1.3, an uncontrolled resource consumption vulnerability exists. A specially crafted unauthenticated HTTP request to the TestController Chart functionality can lead to denial of service.
CVE-2024-5012In WhatsUp Gold versions released before 2023.1.3, there is a missing authentication vulnerability in
WUGDataAccess.Credentials. This vulnerability allows unauthenticated attackers to disclose Windows Credentials stored in the product Credential Library.
CVE-2024-5013In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Denial of Service vulnerability was identified. An unauthenticated attacker can put the application into the
SetAdminPassword installation step, which renders the application non-accessible.
CVE-2024-5014In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the
GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form.
CVE-2024-5015In WhatsUp Gold versions released before 2023.1.3, an authenticated SSRF vulnerability in
Wug.UI.Areas.Wug.Controllers.SessionControler.Update allows a low privileged user to chain this SSRF with an Improper Access Control vulnerability. This can be used to escalate privileges to Admin.
CVE-2024-5016In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. The vulnerability exists in the main message processing routines
NmDistributed.DistributedServiceBehavior.OnMessage for server and
NmDistributed.DistributedClient.OnMessage for clients.
CVE-2024-5017In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists. A specially crafted unauthenticated HTTP request to
AppProfileImport can lead can lead to information disclosure.
CVE-2024-5018In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists
Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory.
CVE-2024-5019In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Arbitrary File Read issue exists in
Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This vulnerability allows reading of any file with
iisapppool\NmConsole privileges.