Allegra getLinkText Server-Side Template Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.
The specific flaw exists within the implementation of getLinkText method. The issue results from the lack of proper validation of a user-supplied string before processing it with the template engine. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-23609.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-Other | |
Metrics |
cvssV3_1
|
Mon, 25 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Alltena
Alltena allegra |
|
CPEs | cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:* | |
Vendors & Products |
Alltena
Alltena allegra |
|
Metrics |
ssvc
|
Fri, 22 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Allegra getLinkText Server-Side Template Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of getLinkText method. The issue results from the lack of proper validation of a user-supplied string before processing it with the template engine. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-23609. | |
Title | Allegra getLinkText Server-Side Template Injection Remote Code Execution Vulnerability | |
Weaknesses | CWE-1336 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-11-25T17:56:00.367Z
Reserved: 2024-03-26T18:52:36.419Z
Link: CVE-2024-30372

Updated: 2024-11-25T17:55:34.213Z

Status : Analyzed
Published: 2024-11-22T20:15:08.550
Modified: 2025-01-03T19:55:22.060
Link: CVE-2024-30372

No data.