{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-56134","assignerOrgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","state":"PUBLISHED","assignerShortName":"ProgressSoftware","dateReserved":"2024-12-16T16:25:36.029Z","datePublished":"2025-02-05T18:02:03.882Z","dateUpdated":"2025-02-05T18:34:49.816Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LoadMaster","vendor":"Progress","versions":[{"lessThan":"7.2.61.0","status":"affected","version":"All Previous Versions","versionType":"LoadMaster"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\n\nImproper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.</p><p>This issue affects:</p>\n\n<table><tbody><tr><td><div><div><p> Product </p></div></div></td><td><div><div><p>Affected Versions </p></div></div></td></tr><tr><td><div><div><p>LoadMaster </p></div></div></td><td><div><div><p>From 7.2.55.0 to 7.2.60.1 (inclusive) </p></div></div></td></tr><tr><td><div><div><p> &nbsp;</p></div></div></td><td><div><div><p>From 7.2.49.0 to 7.2.54.12 (inclusive) </p></div></div></td></tr><tr><td><div><div><p> &nbsp;</p></div></div></td><td><div><div><p>7.2.48.12 and all prior versions </p></div></div></td></tr></tbody></table><br>\n\n<table><tbody><tr><td><div><div><p>Multi-Tenant Hypervisor </p></div></div></td><td><div><div><p>7.1.35.12 and all prior versions </p></div></div></td></tr></tbody></table>\n\n<br><br>\n\n<table><tbody><tr><td><div><div><p>ECS</p></div></div></td><td><div><div><p>All prior versions to 7.2.60.1 (inclusive)</p></div></div></td></tr></tbody></table>\n\n<br><p></p>"}],"value":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)"}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88: OS Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","shortName":"ProgressSoftware","dateUpdated":"2025-02-05T18:02:03.882Z"},"references":[{"url":"https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135"}],"source":{"discovery":"UNKNOWN"},"title":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-05T18:34:35.521140Z","id":"CVE-2024-56134","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-05T18:34:49.816Z"}}]}}