CVE-2022-29847

In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 - Vendor Advisory () https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 - Vendor Advisory
References () https://www.progress.com/network-monitoring - Product () https://www.progress.com/network-monitoring - Product

27 Aug 2024, 17:48

Type Values Removed Values Added
First Time Progress
Progress whatsup Gold
CPE cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*

Information

Published : 2022-05-11 18:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29847

Mitre link : CVE-2022-29847

CVE.ORG link : CVE-2022-29847


JSON object : View

Products Affected

progress

  • whatsup_gold
CWE
CWE-918

Server-Side Request Forgery (SSRF)