Proof-of-Idea Exploit Launched for Progress Software program OpenEdge Vulnerability

Progress Software OpenEdge Vulnerability

Technical specifics and a proof-of-concept (PoC) exploit have been made out there for a not too long ago disclosed vital safety flaw in Progress Software program OpenEdge Authentication Gateway and AdminServer, which may very well be probably exploited to bypass authentication protections.

Tracked as CVE-2024-1403, the vulnerability has a most severity ranking of 10.0 on the CVSS scoring system. It impacts OpenEdge variations 11.7.18 and earlier, 12.2.13 and earlier, and 12.8.0.

“When the OpenEdge Authentication Gateway (OEAG) is configured with an OpenEdge Area that makes use of the OS native authentication supplier to grant user-id and password logins on working platforms supported by lively releases of OpenEdge, a vulnerability within the authentication routines might result in unauthorized entry on tried logins,” the corporate said in an advisory launched late final month.


“Equally, when an AdminServer connection is made by OpenEdge Explorer (OEE) and OpenEdge Administration (OEM), it additionally makes use of the OS native authentication supplier on supported platforms to grant user-id and password logins which will additionally result in unauthorized login entry.”

Progress Software program mentioned the vulnerability incorrectly returns authentication success from an OpenEdge native area if sudden varieties of usernames and passwords should not appropriately dealt with, resulting in unauthorized entry sans correct authentication.

The flaw has been addressed in variations OpenEdge LTS Replace 11.7.19, 12.2.14, and 12.8.1., which reverse-engineered the susceptible AdminServer service, has since released a PoC for CVE-2024-1403, stating the difficulty is rooted in a perform referred to as join() that is invoked when a distant connection is made.

This perform, in flip, calls one other perform referred to as authorizeUser() that validates that the equipped credentials meet sure standards, and passes management to a different a part of the code that straight authenticates the consumer if the supplied username matches “NT AUTHORITYSYSTEM.”


“Deeper attacker floor seems like it might enable a consumer to deploy new functions by way of distant WAR file references, however the complexity elevated dramatically with a view to attain this assault floor due to using inside service message brokers and customized messages,” safety researcher Zach Hanley said.

“We imagine there may be once more possible an avenue to distant code execution by way of in-built performance given sufficient analysis effort.”

Notify of
Inline Feedbacks
View all comments
Previous Post
Japan Blames North Korea for PyPI Supply Chain Cyberattack

Japan Blames North Korea for PyPI Provide Chain Cyberattack

Next Post
Magnet Goblin Hacker Group

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

Related Posts