High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-7654
HighVulnerability Description
An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated. Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users. Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Known Affected Software
32 configuration(s) from 1 vendor(s)
cpe:2.3:a:progress:openedge:12.2.5:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:11.7.18:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.6:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.7:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.10:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.8.1:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.3:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:11.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:11.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:12.2.9:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:10.2b:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:10.2a:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:12.2:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:11.7:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:10.2b07:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:11.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:11.7.16:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:10.1b:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:11.5:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:12.2.12:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.14:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.11:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:11.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:10.2b08:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:11.7.19:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.8:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:11.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:openedge:12.2.13:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.4:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.2.8:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:12.8.2:*:*:*:lts:*:*:*
cpe:2.3:a:progress:openedge:10.1a:*:*:*:*:*:*:*
Severity Details
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Description
- The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- September 03, 2024
External Resources
Related News Articles
Latest news and updates about CVE-2024-7654
