{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6658","assignerOrgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","state":"PUBLISHED","assignerShortName":"ProgressSoftware","dateReserved":"2024-07-10T14:36:47.692Z","datePublished":"2024-09-12T14:38:48.129Z","dateUpdated":"2024-09-23T19:19:19.461Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LoadMaster","vendor":"Progress","versions":[{"lessThan":"7.2.60.1","status":"affected","version":"All Previous Versions","versionType":"LoadMaster"}]}],"credits":[{"lang":"en","type":"finder","value":"Huydoppa from giaohangtietkiem.vn"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.<p>This issue affects:</p>\n\n<table><tbody><tr><td><div><div><p> Product </p></div></div></td><td><div><div><p>Affected Versions </p></div></div></td></tr><tr><td><div><div><p>LoadMaster </p></div></div></td><td><div><div><p>From 7.2.55.0 to 7.2.60.0 (inclusive) </p></div></div></td></tr><tr><td><div><div><p> &nbsp;</p></div></div></td><td><div><div><p>From 7.2.49.0 to 7.2.54.11 (inclusive) </p></div></div></td></tr><tr><td><div><div><p> &nbsp;</p></div></div></td><td><div><div><p>7.2.48.12 and all prior versions </p></div></div></td></tr></tbody></table><br>\n\n<table><tbody><tr><td><div><div><p>Multi-Tenant Hypervisor </p></div></div></td><td><div><div><p>7.1.35.11 and all prior versions </p></div></div></td></tr></tbody></table>\n\n<br>\n\n<table><tbody><tr><td><div><div><p>ECS</p></div></div></td><td><div><div><p>All prior versions to 7.2.60.0 (inclusive)</p></div></div></td></tr></tbody></table>\n\n\n\n<br>"}],"value":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n\n\n Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.0 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.11 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.11 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.0 (inclusive)"}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88: OS Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","shortName":"ProgressSoftware","dateUpdated":"2024-09-23T19:19:19.461Z"},"references":[{"tags":["vendor-advisory"],"url":"https://support.kemptechnologies.com/hc/en-us/articles/28910587250701"}],"source":{"discovery":"UNKNOWN"},"title":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"kemptechnologies","product":"loadmaster","cpes":["cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"7.2.48.12","versionType":"custom"},{"version":"7.2.49.0","status":"affected","lessThan":"7.2.54.12","versionType":"custom"},{"version":"7.2.55.0","status":"affected","lessThan":"7.2.60.1","versionType":"custom"}]},{"vendor":"kemptechnologies","product":"loadmaster_mt","cpes":["cpe:2.3:a:kemptechnologies:loadmaster_mt:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"7.1.35.12","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-12T14:52:16.894185Z","id":"CVE-2024-6658","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T14:55:48.364Z"}}]}}