Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms
Metrics
Affected Vendors & Products
References
History
Tue, 03 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress openedge |
|
| CPEs | cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress
Progress openedge |
|
| Metrics |
ssvc
|
Tue, 03 Sep 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms | |
| Title | Direct local client connections to MS Agents can bypass authentication | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2024-09-03T14:50:15.520Z
Updated: 2024-09-03T15:08:13.876Z
Reserved: 2024-07-31T17:32:09.678Z
Link: CVE-2024-7345
Updated: 2024-09-03T15:08:08.132Z
Status : Analyzed
Published: 2024-09-03T15:15:16.707
Modified: 2024-09-05T14:11:00.493
Link: CVE-2024-7345
No data.