Allegra Release Notes

Release Notes for Allegra Release 7.5.1

by Nina Howell

Important Security Updates

We are pleased to introduce you to version 7.5.1 of Allegra, which includes very important security improvements and enhancements for better usability. This update is part of our commitment to continuously offer you a secure and efficient product.

To address the security vulnerabilities listed below, it is strongly recommended to update to the latest Allegra version 7.5.1. Upon installation, a fix will be applied for each ZDI CAN listed in the table below, except for ZDI-CAN-22360. Cloud customers do not need to take any action, as we have updated their instances immediately following the disclosure.

Additional note on ZDI-CAN-22360 for On-Premise customers: Please check whether you have changed the Allegra database default password after installation.

You can download the latest Allegra version 7.5.1 here.

The Allegra version 7.5.1 includes fixes to strengthen security for the following issues:

ZDI CAN Product Affected CVSS Score + Vector Description
ZDI-CAN-22507 Allegra Versions lower 7.5.1. 7.5 – High
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
An Arbitrary File Read vulnerability, which can be exploited by authenticated users, including those with a Guest role. This vulnerability is treated as unauthenticated since if anonymous access is activated anyone can login.
ZDI-CAN-22530 Allegra Versions lower 7.5.1 7.5 – High
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
ZDI-CAN-22532 Allegra Versions lower 7.5.1 7.5 – HIgh
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unauthenticated Arbitrary File Read vulnerability. It requires the existence of the C:\Allegra\plugins\tp-math directory.
ZDI-CAN-22513 Allegra Versions lower 7.5.1 7.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability during the backup restore operation. Admin privileges are required for exploitation.
ZDI-CAN-22512 Allegra Versions lower 7.5.1 9.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unauthenticated Remote Code Execution due to improper access control in the Struts SiteConfigAction action of Allegra software.
ZDI-CAN-22510 Allegra Versions lower 7.5.1 7.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability in the uploadFile method of the BrandingAction class. Admin privileges are required for exploitation.
ZDI-CAN-22548 Allegra Versions lower 7.5.1 9.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Remote Code Execution that can be exploited by any authenticated user, including those with a Guest role. This vulnerability is treated as unauthenticated since if anonymous access is activated anyone can login.
ZDI-CAN-22506 Allegra Versions lower 7.5.1
ZDI-CAN-22505 Allegra Versions lower 7.5.1
ZDI-CAN-22504 Allegra Versions lower 7.5.1 7.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Post-authentication Remote Code Execution due to a directory traversal vulnerability during a file upload operation. Admin privileges are required for exploitation.
ZDI-CAN-22528 Allegra Versions lower 7.5.1 7.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ZDI-CAN-22527 Allegra Versions lower 7.5.1 7.2 – High
CVSS:AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ZDI-CAN-22361 Allegra Versions lower 7.5.1 9.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Directory Traversal Authentication Bypass Vulnerability.
ZDI-CAN-22360 Allegra Versions lower 7.5.1 9.8 – Critical
CVSS:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Authentication Bypass due to Hard-coded Credentials.The critical aspect of this vulnerability lies in the fact that every Allegra installation uses the same default database password, which is possibly not changed post-installation. This vulnerability only affects On-Premise customers. We highly recommend changing database passwords after installing Allegra.

Back to overview