No analysis available yet.
Vendor Solution
Use the 12.8.0 or above LTS release where the vulnerability does not exist
Vendor Workaround
Do not put client software on host webserver systems
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48283 | Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms |
Tue, 03 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress openedge |
|
| CPEs | cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress
Progress openedge |
|
| Metrics |
ssvc
|
Tue, 03 Sep 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms | |
| Title | Direct local client connections to MS Agents can bypass authentication | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-09-03T15:08:13.876Z
Reserved: 2024-07-31T17:32:09.678Z
Link: CVE-2024-7345
Updated: 2024-09-03T15:08:08.132Z
Status : Analyzed
Published: 2024-09-03T15:15:16.707
Modified: 2024-09-05T14:11:00.493
Link: CVE-2024-7345
No data.
OpenCVE Enrichment
No data.
EUVD