v7.5.1 Jörg Friedrich

Release Notes for Allegra Release 7.5.1

Important Security Updates

We are pleased to introduce you to version 7.5.1 of Allegra, which includes very important security improvements and enhancements for better usability. This update is part of our commitment to continuously offer you a secure and efficient product.

To address the security vulnerabilities listed below, it is strongly recommended to update to the latest Allegra version 7.5.1. Upon installation, a fix will be applied for each ZDI CAN listed in the table below, except for ZDI-CAN-22360. Cloud customers do not need to take any action, as we have updated their instances immediately following the disclosure.

Additional note on ZDI-CAN-22360 for On-Premise customers: Please check whether you have changed the Allegra database default password after installation.

You can download the latest Allegra version 7.5.1 here.

The Allegra version 7.5.1 includes fixes to strengthen security for the following issues:

ZDI CANProduct AffectedCVSS Score + VectorDescription
ZDI-CAN-22507Allegra Versions lower 7.5.1.7.5 – High
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
An Arbitrary File Read vulnerability, which can be exploited by authenticated users, including those with a Guest role. This vulnerability is treated as unauthenticated since if anonymous access is activated anyone can login.
ZDI-CAN-22530Allegra Versions lower 7.5.17.5 – High
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
ZDI-CAN-22532Allegra Versions lower 7.5.17.5 – HIgh
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unauthenticated Arbitrary File Read vulnerability. It requires the existence of the C:\Allegra\plugins\tp-math directory.
ZDI-CAN-22513Allegra Versions lower 7.5.17.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability during the backup restore operation. Admin privileges are required for exploitation.
ZDI-CAN-22512Allegra Versions lower 7.5.19.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unauthenticated Remote Code Execution due to improper access control in the Struts SiteConfigAction action of Allegra software.
ZDI-CAN-22510Allegra Versions lower 7.5.17.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability in the uploadFile method of the BrandingAction class. Admin privileges are required for exploitation.
ZDI-CAN-22548Allegra Versions lower 7.5.19.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Remote Code Execution that can be exploited by any authenticated user, including those with a Guest role. This vulnerability is treated as unauthenticated since if anonymous access is activated anyone can login.
ZDI-CAN-22506Allegra Versions lower 7.5.1
ZDI-CAN-22505Allegra Versions lower 7.5.1
ZDI-CAN-22504Allegra Versions lower 7.5.17.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability during a file upload operation. Admin privileges are required for exploitation.
ZDI-CAN-22528Allegra Versions lower 7.5.17.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ZDI-CAN-22527Allegra Versions lower 7.5.17.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ZDI-CAN-22361Allegra Versions lower 7.5.19.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Directory Traversal Authentication Bypass Vulnerability.
ZDI-CAN-22360Allegra Versions lower 7.5.19.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Authentication Bypass due to Hard-coded Credentials.The critical aspect of this vulnerability lies in the fact that every Allegra installation uses the same default database password, which is possibly not changed post-installation. This vulnerability only affects On-Premise customers. We highly recommend changing database passwords after installing Allegra.
Jörg Friedrich

Jörg Friedrich

Senior Advisor

Jörg Friedrich is the original author of the project management software Allegra and continues to accompany its development to this day. He has many years of industry experience as a project and department manager. He also serves as a professor in the Faculty of Computer Science and Information Technology at Esslingen University of Applied Sciences.