Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms
Metrics
Affected Vendors & Products
References
History
Tue, 03 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress openedge |
|
CPEs | cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress openedge |
|
Metrics |
ssvc
|
Tue, 03 Sep 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms | |
Title | Direct local client connections to MS Agents can bypass authentication | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2024-09-03T14:50:15.520Z
Updated: 2024-09-03T15:08:13.876Z
Reserved: 2024-07-31T17:32:09.678Z
Link: CVE-2024-7345
Vulnrichment
Updated: 2024-09-03T15:08:08.132Z
NVD
Status : Analyzed
Published: 2024-09-03T15:15:16.707
Modified: 2024-09-05T14:11:00.493
Link: CVE-2024-7345
Redhat
No data.