Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-7654", "assignerOrgId": "f9fea0b6-671e-4eea-8fde-31911902ae05", "state": "PUBLISHED", "assignerShortName": "ProgressSoftware", "dateReserved": "2024-08-09T18:27:48.920Z", "datePublished": "2024-09-03T14:48:00.539Z", "dateUpdated": "2024-09-03T15:09:51.475Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "modules": ["OpenEdge Explorer", "OpenEdge Management"], "platforms": ["Windows", "Linux", "x86", "64 bit", "32 bit"], "product": "OpenEdge", "vendor": "Progress", "versions": [{"lessThan": "11.7.19", "status": "affected", "version": "11.7.0", "versionType": "custom"}, {"lessThan": "12.2.15", "status": "affected", "version": "12.2.0", "versionType": "custom"}, {"lessThan": "12.8.2", "status": "affected", "version": "12.8.0", "versionType": "custom"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated. Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users. Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default. <br>"}], "value": "An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated.\u00a0 Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users.\u00a0\u00a0 Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default."}], "impacts": [{"capecId": "CAPEC-18", "descriptions": [{"lang": "en", "value": "CAPEC-18: XSS Targeting Non-Script Elements"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f9fea0b6-671e-4eea-8fde-31911902ae05", "shortName": "ProgressSoftware", "dateUpdated": "2024-09-03T14:48:00.539Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://community.progress.com/s/article/Unauthenticated-Content-Injection-in-OpenEdge-Management-web-interface-via-ActiveMQ-discovery-service"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Use the 12.8.3 or above LTS release where the vulnerability does not exist\n\n<br>"}], "value": "Use the 12.8.3 or above LTS release where the vulnerability does not exist"}, {"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Use the 12.2 LTS release at the 12.2.15 Update level or above\n\n\n\n<br>"}], "value": "Use the 12.2 LTS release at the 12.2.15 Update level or above"}, {"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Use the 11.7 LTS release at the 11.7.20 Update level or above\n\n\n\n\n\n<br>"}], "value": "Use the 11.7 LTS release at the 11.7.20 Update level or above"}], "source": {"discovery": "UNKNOWN"}, "title": "Unauthenticated Content Injection in OpenEdge Management web interface via ActiveMQ discovery service", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "progress", "product": "openedge", "cpes": ["cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*"], "defaultStatus": "affected", "versions": [{"version": "11.7.0", "status": "affected", "lessThan": "11.7.19", "versionType": "custom"}, {"version": "12.2.0", "status": "affected", "lessThan": "12.2.15", "versionType": "custom"}, {"version": "12.8.0", "status": "affected", "lessThan": "12.8.2", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-03T15:08:38.821486Z", "id": "CVE-2024-7654", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-03T15:09:51.475Z"}}]}}