Insecure default configuration in Progress Software OpenEdge 10.2x and 11.x allows unauthenticated remote attackers to specify arbitrary URLs from which to load and execute malicious Java classes via port 20931.
References
Link | Resource |
---|---|
https://knowledgebase.progress.com/articles/Article/How-to-prevent-Java-RMI-class-loader-exploit-with-AdminServer | Issue Tracking Vendor Advisory |
https://knowledgebase.progress.com/articles/Article/How-to-prevent-Java-RMI-class-loader-exploit-with-AdminServer | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://knowledgebase.progress.com/articles/Article/How-to-prevent-Java-RMI-class-loader-exploit-with-AdminServer - Issue Tracking, Vendor Advisory |
Information
Published : 2017-10-31 07:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9245
Mitre link : CVE-2015-9245
CVE.ORG link : CVE-2015-9245
JSON object : View
Products Affected
progress
- openedge
CWE
CWE-284
Improper Access Control