Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-6658", "assignerOrgId": "f9fea0b6-671e-4eea-8fde-31911902ae05", "state": "PUBLISHED", "assignerShortName": "ProgressSoftware", "dateReserved": "2024-07-10T14:36:47.692Z", "datePublished": "2024-09-12T14:38:48.129Z", "dateUpdated": "2024-09-23T19:19:19.461Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "LoadMaster", "vendor": "Progress", "versions": [{"lessThan": "7.2.60.1", "status": "affected", "version": "All Previous Versions", "versionType": "LoadMaster"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Huydoppa from giaohangtietkiem.vn"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.<p>This issue affects:</p>\n\n<table><tbody><tr><td><div><div><p>\u202fProduct </p></div></div></td><td><div><div><p>Affected Versions </p></div></div></td></tr><tr><td><div><div><p>LoadMaster </p></div></div></td><td><div><div><p>From 7.2.55.0 to 7.2.60.0 (inclusive) </p></div></div></td></tr><tr><td><div><div><p>\u202f </p></div></div></td><td><div><div><p>From 7.2.49.0 to 7.2.54.11 (inclusive) </p></div></div></td></tr><tr><td><div><div><p>\u202f </p></div></div></td><td><div><div><p>7.2.48.12 and all prior versions </p></div></div></td></tr></tbody></table><br>\n\n<table><tbody><tr><td><div><div><p>Multi-Tenant Hypervisor </p></div></div></td><td><div><div><p>7.1.35.11 and all prior versions </p></div></div></td></tr></tbody></table>\n\n<br>\n\n<table><tbody><tr><td><div><div><p>ECS</p></div></div></td><td><div><div><p>All prior versions to 7.2.60.0 (inclusive)</p></div></div></td></tr></tbody></table>\n\n\n\n<br>"}], "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.0 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.11 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.11 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.0 (inclusive)"}], "impacts": [{"capecId": "CAPEC-88", "descriptions": [{"lang": "en", "value": "CAPEC-88: OS Command Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f9fea0b6-671e-4eea-8fde-31911902ae05", "shortName": "ProgressSoftware", "dateUpdated": "2024-09-23T19:19:19.461Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://support.kemptechnologies.com/hc/en-us/articles/28910587250701"}], "source": {"discovery": "UNKNOWN"}, "title": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "kemptechnologies", "product": "loadmaster", "cpes": ["cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "0", "status": "affected", "lessThanOrEqual": "7.2.48.12", "versionType": "custom"}, {"version": "7.2.49.0", "status": "affected", "lessThan": "7.2.54.12", "versionType": "custom"}, {"version": "7.2.55.0", "status": "affected", "lessThan": "7.2.60.1", "versionType": "custom"}]}, {"vendor": "kemptechnologies", "product": "loadmaster_mt", "cpes": ["cpe:2.3:a:kemptechnologies:loadmaster_mt:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "0", "status": "affected", "lessThan": "7.1.35.12", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-12T14:52:16.894185Z", "id": "CVE-2024-6658", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-12T14:55:48.364Z"}}]}}