Page 2 of 12 results (0.003 seconds)

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 0

This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible. Este problema afecta a Progress Application Server (PAS) para OpenEdge en las versiones 11.7 anteriores a 11.7.18, 12.2 anteriores a 12.2.13 y versiones de innovación anteriores a 12.8.0. Un atacante puede formular una solicitud para un transporte WEB que permita cargas de archivos no deseadas a una ruta de directorio del servidor en el sistema que ejecuta PASOE. • https://community.progress.com/s/article/Important-Progress-OpenEdge-Critical-Alert-for-Progress-Application-Server-in-OpenEdge-PASOE-Arbitrary-File-Upload-Vulnerability-in-WEB-Transport https://www.progress.com/openedge • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

In Progress OpenEdge OEM (OpenEdge Management) and OEE (OpenEdge Explorer) before 12.7, a remote user (who has any OEM or OEE role) could perform a URL injection attack to change identity or role membership, e.g., escalate to admin. This affects OpenEdge LTS before 11.7.16, 12.x before 12.2.12, and 12.3.x through 12.6.x before 12.7. • https://www.progress.com/openedge • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

In Progress OpenEdge before 11.7.14 and 12.x before 12.2.9, certain SUID binaries within the OpenEdge application were susceptible to privilege escalation. If exploited, a local attacker could elevate their privileges and compromise the affected system. En Progress OpenEdge versiones anteriores a 11.7.14 y versiones 12.x anteriores a 12.2.9, determinados binarios SUID dentro de la aplicación OpenEdge eran susceptibles de escalar privilegios. Si es explotado, un atacante local podría elevar sus privilegios y comprometer el sistema afectado • https://community.progress.com/s/article/OpenEdge-11-7-14-is-Now-Available https://community.progress.com/s/article/OpenEdge-12-2-9-Update-is-available https://community.progress.com/s/article/Remediation-of-Privilege-Escalation-Security-Vulnerability-CVE-2022-29849 https://www.progress.com/openedge •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

Insecure default configuration in Progress Software OpenEdge 10.2x and 11.x allows unauthenticated remote attackers to specify arbitrary URLs from which to load and execute malicious Java classes via port 20931. Una configuración por defecto insegura en Progress Software OpenEdge, en sus versiones 10.2x y 11.x permite que atacantes remotos no autenticados especifiquen URL arbitrarios desde los que cargar y ejecutar clases Java maliciosas mediante el puerto 20931. • https://knowledgebase.progress.com/articles/Article/How-to-prevent-Java-RMI-class-loader-exploit-with-AdminServer • CWE-284: Improper Access Control •

CVSS: 5.0EPSS: 10%CPEs: 1EXPL: 4

Directory traversal vulnerability in report/reportViewAction.jsp in Progress Software OpenEdge 11.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the selection parameter. Vulnerabilidad de salto de directorio en report/reportViewAction.jsp en Progress Software OpenEdge 11.2 permite a atacantes remotos leer ficheros arbitrarios a través de un .. (punto punto) en el parámetro selection. Progress OpenEdge version 11.2 suffers from a directory traversal vulnerability. • https://www.exploit-db.com/exploits/35127 http://packetstormsecurity.com/files/129052/Progress-OpenEdge-11.2-Directory-Traversal.html http://www.exploit-db.com/exploits/35127 http://www.exploit-db.com/exploits/35207 https://www.xlabs.com.br/blog/?p=256 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •