CVE-2024-0219 – Privilege Elevation via Telerik JustDecompile Installer
https://notcve.org/view.php?id=CVE-2024-0219
In Telerik JustDecompile versions prior to 2024 R1, a privilege elevation vulnerability has been identified in the applications installer component. In an environment where an existing Telerik JustDecompile install is present, a lower privileged user has the ability to manipulate the installation package to elevate their privileges on the underlying operating system. En las versiones de Telerik JustDecompile anteriores a 2024 R1, se identificó una vulnerabilidad de elevación de privilegios en el componente del instalador de aplicaciones. En un entorno donde existe una instalación de Telerik JustDecompile, un usuario con privilegios inferiores tiene la capacidad de manipular el paquete de instalación para elevar sus privilegios en el sistema operativo subyacente. • https://docs.telerik.com/devtools/justdecompile/knowledge-base/legacy-installer-vulnerability https://www.telerik.com/products/decompiler.aspx • CWE-269: Improper Privilege Management •
CVE-2023-40052 – Progress Application Server (PAS) for OpenEdge Denial of Service
https://notcve.org/view.php?id=CVE-2023-40052
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0 . An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests. Este problema afecta a Progress Application Server (PAS) para OpenEdge en las versiones 11.7 anteriores a 11.7.18, 12.2 anteriores a 12.2.13 y versiones de innovación anteriores a 12.8.0. Un atacante que pueda generar una solicitud web con formato incorrecto puede provocar el bloqueo de un agente PASOE, lo que podría interrumpir las actividades de subprocesos de muchos clientes de aplicaciones web. Varios de estos ataques DoS podrían provocar una inundación de solicitudes no válidas en comparación con la capacidad restante del servidor para procesar solicitudes válidas. • https://community.progress.com/s/article/Important-Progress-OpenEdge-Product-Alert-for-Progress-Application-Server-for-OpenEdge-PASOE-Denial-of-Service-Vulnerability-in-WEB-Transport https://www.progress.com/openedge • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-40051 – Progress Application Server (PAS) for OpenEdge File Upload via Directory Traversal
https://notcve.org/view.php?id=CVE-2023-40051
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible. Este problema afecta a Progress Application Server (PAS) para OpenEdge en las versiones 11.7 anteriores a 11.7.18, 12.2 anteriores a 12.2.13 y versiones de innovación anteriores a 12.8.0. Un atacante puede formular una solicitud para un transporte WEB que permita cargas de archivos no deseadas a una ruta de directorio del servidor en el sistema que ejecuta PASOE. • https://community.progress.com/s/article/Important-Progress-OpenEdge-Critical-Alert-for-Progress-Application-Server-in-OpenEdge-PASOE-Arbitrary-File-Upload-Vulnerability-in-WEB-Transport https://www.progress.com/openedge • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-0396 – Missing Server-Side Input Validation in HTTP Parameter
https://notcve.org/view.php?id=CVE-2024-0396
In Progress MOVEit Transfer versions released before 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 (15.1.3), an input validation issue was discovered. An authenticated user can manipulate a parameter in an HTTPS transaction. The modified transaction could lead to computational errors within MOVEit Transfer and potentially result in a denial of service. En las versiones de Progress MOVEit Transfer lanzadas antes de 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 (15.1.3), se descubrió un problema de validación de entrada. Un usuario autenticado puede manipular un parámetro en una transacción HTTPS. • https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-January-2024 https://www.progress.com/moveit • CWE-20: Improper Input Validation •
CVE-2023-6784 – Potential Use of the Sitefinity System for Distribution of Phishing Emails
https://notcve.org/view.php?id=CVE-2023-6784
A malicious user could potentially use the Sitefinity system for the distribution of phishing emails. Un usuario malintencionado podría utilizar el sistema Sitefinity para la distribución de correos electrónicos de phishing. • https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerability-CVE-2023-6784-December-2023 https://www.progress.com/sitefinity-cms • CWE-20: Improper Input Validation •