CyberSecurity news

FlagThis

@securityonline.info - 16d
Progress Software has released patches for multiple high-severity vulnerabilities affecting its LoadMaster software. The vulnerabilities, identified as CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, CVE-2024-56134, and CVE-2024-56135, could be exploited by remote malicious actors to execute arbitrary system commands or download any file from the system. The flaws stem from improper input validation and affect various LoadMaster versions, including the Multi-Tenant edition.

These vulnerabilities could allow authenticated attackers with access to the LoadMaster management interface to inject malicious commands via crafted HTTP requests. Specifically, successful exploitation could enable remote actors to execute arbitrary system commands after gaining access and authenticating to the management interface. Progress Software has addressed these issues by implementing input sanitization to prevent the execution of arbitrary system commands. While there are no reported cases of these vulnerabilities being exploited, users are strongly urged to apply the latest patches for optimal protection.
Original img attribution: https://securityonline.info/wp-content/uploads/2024/07/Progress-CVE.webp
ImgSrc: securityonline.

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • community.progress.com: Remote malicious actors who gain access to the management interface of LoadMaster and successfully authenticate could issue a carefully crafted HTTP request that allows arbitrary system commands to be executed.
  • securityaffairs.com: Progress Software fixed multiple vulnerabilities in its LoadMaster software, which could be exploited to execute arbitrary system commands.
  • securityonline.info: Progress has issued a security advisory addressing multiple vulnerabilities affecting all current LoadMaster releases and the LoadMaster Multi-Tenant The post appeared first on .
  • The Hacker News: Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system.
Classification:
  • HashTags: #ProgressSoftware #LoadMaster #PatchNow
  • Company: Progress Software
  • Target: LoadMaster Users
  • Product: LoadMaster
  • Feature: Improper Input Validation
  • Type: ProductUpdate
  • Severity: High