CVE-2024-5015
📋 TL;DR
This vulnerability allows authenticated low-privileged users in WhatsUp Gold to perform server-side request forgery (SSRF) attacks. By chaining this SSRF with an improper access control vulnerability, attackers can escalate privileges to administrative level. All WhatsUp Gold installations before version 2023.1.3 are affected.
💻 Affected Systems
- WhatsUp Gold
📦 What is this software?
Whatsup Gold by Progress
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with administrative access, enabling data theft, configuration changes, and further network exploitation.
Likely Case
Privilege escalation to admin level, allowing unauthorized access to sensitive network monitoring data and system controls.
If Mitigated
Limited impact with proper network segmentation and authentication controls, though SSRF could still enable internal reconnaissance.
🎯 Exploit Status
Requires chaining two vulnerabilities (SSRF + access control bypass) but both are in the same endpoint. Authentication with low privileges is required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2023.1.3 and later
Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024
Restart Required: Yes
Instructions:
1. Download WhatsUp Gold version 2023.1.3 or later from Progress website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart WhatsUp Gold services.
🔧 Temporary Workarounds
Network segmentation
allRestrict WhatsUp Gold server's outbound network access to prevent SSRF exploitation
Configure firewall rules to limit outbound connections from WhatsUp Gold server
Access control hardening
allReview and restrict low-privileged user accounts
Audit user accounts with low privileges and remove unnecessary accounts
🧯 If You Can't Patch
- Implement strict network segmentation to limit WhatsUp Gold server's outbound connections
- Monitor for unusual privilege escalation attempts and review all admin account activities
🔍 How to Verify
Check if Vulnerable:
Check WhatsUp Gold version in administration interface or via 'wugadmin -version' command
Check Version:
wugadmin -version
Verify Fix Applied:
Verify version is 2023.1.3 or later and test the SessionController.Update endpoint functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual SSRF attempts in application logs
- Unexpected privilege escalation events
- Multiple failed admin login attempts followed by successful escalation
Network Indicators:
- Outbound HTTP requests from WhatsUp Gold server to internal services
- Unusual authentication patterns to admin interfaces
SIEM Query:
source="WhatsUpGold" AND (event_type="privilege_escalation" OR url_contains="SessionController/Update")