Lucene search

K
cveProgressSoftwareCVE-2023-40051
HistoryJan 18, 2024 - 3:15 p.m.

CVE-2023-40051

2024-01-1815:15:09
CWE-434
ProgressSoftware
web.nvd.nist.gov
32
cve-2023-40051
progress application server
pas
openedge
file upload
security vulnerability
attack vector
cve

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

19.3%

This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0.Β An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.

Affected configurations

Nvd
Node
progressopenedgeRange11.7–11.7.18
OR
progressopenedgeRange12.2–12.2.13
Node
progressopenedge_innovationRange<12.8.0
VendorProductVersionCPE
progressopenedge*cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
progressopenedge_innovation*cpe:2.3:a:progress:openedge_innovation:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "Progress Application Server (PAS) for OpenEdge"
    ],
    "product": "OpenEdge",
    "vendor": "Progress Software Corporation",
    "versions": [
      {
        "lessThan": "11.7.18",
        "status": "affected",
        "version": "11.7.0",
        "versionType": "semver"
      },
      {
        "lessThan": "12.2.13",
        "status": "affected",
        "version": "12.2.0",
        "versionType": "semver"
      },
      {
        "lessThan": "12.8.0",
        "status": "affected",
        "version": "Innovation Releases",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

19.3%

Related for CVE-2023-40051