This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.
Published 2024-01-18 15:15:09
Updated 2024-01-26 15:25:19
View at NVD,   CVE.org

Products affected by CVE-2023-40051

Exploit prediction scoring system (EPSS) score for CVE-2023-40051

0.09%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-40051

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.9
CRITICAL CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
3.1
6.0
NIST 2024-01-26
9.1
CRITICAL CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L
3.1
5.3
Progress Software Corporation 2024-01-18

CWE ids for CVE-2023-40051

References for CVE-2023-40051

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!