Progress Software patches critical OpenEdge vulnerability

By
Follow google news

Attack via malicious file uploads.

Progress Software has disclosed a critical vulnerability in several versions of its Progress Application Server in OpenEdge (PASOE) software.

Progress Software patches critical OpenEdge vulnerability

According to an advisory, CVE-2023-40051 affects OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0.

“An attacker can formulate a request for a web transport that allows unintended file uploads to a server directory path on the system running PASOE," the advisory states.

“If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.”

Progress Software explained that the web transport supports file uploads “across all web handlers” via built-in handlers.

“The expected behaviour is that file upload is disabled by default since the value for the ‘fileUploadDirectory’ property in the openedge.properties file is blank," the company said.

The problem is, the default setting gives the user account that launched the PASOE instance “access to all directories”, and if the directories have write permission, the system is subject to malicious file upload on Linux or on the root drive under Windows.

Users that can’t patch immediately are advised a temporary mitigation is available by setting the “fileUploadDirectory” configuration property to a non-existent directory.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW gov contractor uploaded Excel spreadsheet of flood victims' data to ChatGPT

NSW gov contractor uploaded Excel spreadsheet of flood victims' data to ChatGPT

Asahi Group production impacted by cyberattack

Asahi Group production impacted by cyberattack

Age verification IDs taken in Discord data breach

Age verification IDs taken in Discord data breach

QBE shifts cyber leadership to the US

QBE shifts cyber leadership to the US

Log In

  |  Forgot your password?