CVE-2022-29847

In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*

History

20 May 2022, 14:36

Type Values Removed Values Added
CPE cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*
References (MISC) https://www.progress.com/network-monitoring - (MISC) https://www.progress.com/network-monitoring - Product
References (MISC) https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 - (MISC) https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 - Vendor Advisory
First Time Ipswitch
Ipswitch whatsup Gold
CWE CWE-918
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

11 May 2022, 18:32

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-11 18:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-29847

Mitre link : CVE-2022-29847

CVE.ORG link : CVE-2022-29847


JSON object : View

Products Affected

ipswitch

  • whatsup_gold
CWE
CWE-918

Server-Side Request Forgery (SSRF)