- Description
- Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) From 7.2.49.0 to 7.2.54.12 (inclusive) 7.2.48.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive)
- Source
- security@progress.com
- NVD status
- Analyzed
- Products
- multi-tenant_loadmaster, loadmaster
CVSS 3.1
- Type
- Primary
- Base score
- 6.8
- Impact score
- 5.9
- Exploitability score
- 0.9
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- security@progress.com
- CWE-20
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
Multiple LoadMaster vulnerabilities (CVE-2024-56131 to CVE-2024-56135) allow remote command execution and file access. https://t.co/tG2xoIFZ5u
@SRA_ThreatWatch
12 Feb 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**Threat Alert: Progress LoadMaster Critical Flaws** **Timeline:** - Discovery: 2024-01-14 - Patch: 2024-02-05 **Summary:** Vulnerabilities in Progress LoadMaster (CVE-2024-56131 through CVE-2024-56135) due to improper input validation allow authenticated users to inject…
@syedaquib77
11 Feb 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-56135: HIGH] Security alert: Authenticated users in Progress LoadMaster face OS Command Injection due to Improper Input Validation. Affected versions range from 7.2.48.12 to 7.2.60.1 - act now to secure...#cybersecurity,#vulnerability https://t.co/vTdc29xhWp https://t.c
@CveFindCom
5 Feb 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-56135 Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: Product Affected Ve… https://t.co/SwTK98m30C
@CVEnew
5 Feb 2025
293 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:progress:multi-tenant_loadmaster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEF2ABC-DFB1-4C90-BCF6-CD5176FA4559",
"versionEndExcluding": "7.1.35.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF6DDA7-65D0-4678-8F19-CAB4A158EA25",
"versionEndIncluding": "7.2.48.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "215681F7-A219-482B-BFCE-262B923BB56E",
"versionEndExcluding": "7.2.54.13",
"versionStartIncluding": "7.2.49.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15177F19-9252-4151-93D9-850CCAC8E6EB",
"versionEndExcluding": "7.2.61.0",
"versionStartIncluding": "7.2.55.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]