- Description
- OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process.
- Source
- security@progress.com
- NVD status
- Analyzed
- Products
- connection_manager_for_objectscale, ecs_connection_manager, loadmaster
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security@progress.com
- CWE-77
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:progress:connection_manager_for_objectscale:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29595DEA-0B11-4F15-9D98-2FE6B921E1BB",
"versionEndExcluding": "7.2.63.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:progress:ecs_connection_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73724463-A364-43DE-BF05-641226373DD6",
"versionEndExcluding": "7.2.63.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:*",
"matchCriteriaId": "AC313444-74D6-491D-B7BA-36BF6382D4FC",
"versionEndExcluding": "7.2.54.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:*",
"matchCriteriaId": "A03DB1D6-4225-406D-8A53-3730266390C1",
"versionEndExcluding": "7.2.63.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]