Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-38302 | In Progress OpenEdge OEM (OpenEdge Management) and OEE (OpenEdge Explorer) before 12.7, a remote user (who has any OEM or OEE role) could perform a URL injection attack to change identity or role membership, e.g., escalate to admin. This affects OpenEdge LTS before 11.7.16, 12.x before 12.2.12, and 12.3.x through 12.6.x before 12.7. |
| Link | Providers |
|---|---|
| https://www.progress.com/openedge |
|
Mon, 02 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-02T14:50:19.648Z
Reserved: 2023-05-30T00:00:00.000Z
Link: CVE-2023-34203
Updated: 2024-08-02T16:01:54.304Z
Status : Modified
Published: 2023-06-23T20:15:09.103
Modified: 2024-11-21T08:06:45.743
Link: CVE-2023-34203
No data.
OpenCVE Enrichment
No data.
EUVD