CVE-2023-52333

Allegra saveFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The specific flaw exists within the saveFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22548.
Configurations

Configuration 1 (hide)

cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*

History

03 Jan 2025, 19:49

Type Values Removed Values Added
References () https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html - () https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html - Release Notes
References () https://www.zerodayinitiative.com/advisories/ZDI-24-104/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-104/ - Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.3
First Time Alltena
Alltena allegra
CPE cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*

Information

Published : 2024-11-22 20:15

Updated : 2025-01-03 19:49


NVD link : CVE-2023-52333

Mitre link : CVE-2023-52333

CVE.ORG link : CVE-2023-52333


JSON object : View

Products Affected

alltena

  • allegra
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')