CVE-2023-40051
Progress OpenEdge vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2023-40051) was identified in Progress Application Server (PAS) for OpenEdge affecting versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. The vulnerability was disclosed on January 18, 2024, and received a critical CVSS score of 9.1. The issue exists in the WEB transport mechanism of PASOE, which allows unintended file uploads to server directory paths (SecurityOnline, NVD).

Technical details

The vulnerability stems from an oversight in the WEB transport mechanism of PASOE, which inherently supports file uploads across all web handlers, including built-in handlers. While the file upload capability is intended to be disabled by default through the blank 'fileUploadDirectory' property in the openedge.properties file, this setting inadvertently grants access to all directories for the user account that initiated the PASOE instance. This becomes particularly dangerous when these directories have write permissions, enabling potential file upload attacks on both Linux and Windows root drive systems (SecurityOnline).

Impact

If successfully exploited, the vulnerability allows attackers to upload files to server directory paths on systems running PASOE. The impact is particularly severe if the uploaded content contains malicious payloads that can further exploit the server or its network, potentially leading to larger-scale attacks. The critical CVSS score of 9.1 reflects the significant potential impact on system security (NVD).

Mitigation and workarounds

Progress Software has released security updates in OpenEdge versions 11.7.18, 12.2.13, and 12.8.0 to address this vulnerability. For organizations unable to immediately apply these updates, a temporary mitigation involves setting the 'fileUploadDirectory' property in the openedge.properties file to a non-existent directory and restarting the instance (SecurityOnline).

Community reactions

Progress Software has emphasized the urgency of applying the security patches, with a spokesperson stating, 'While we have not seen any evidence that this vulnerability has been exploited at this time, we are encouraging customers to apply the patch as soon as possible' (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Related Progress OpenEdge vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-1403CRITICAL9.8
  • Progress OpenEdgeProgress OpenEdge
  • cpe:2.3:a:progress:openedge
NoYesFeb 27, 2024
CVE-2024-7345CRITICAL9.6
  • Progress OpenEdgeProgress OpenEdge
  • cpe:2.3:a:progress:openedge
NoYesSep 03, 2024
CVE-2025-7388HIGH8.4
  • Progress OpenEdgeProgress OpenEdge
  • cpe:2.3:a:progress:openedge
NoYesSep 04, 2025
CVE-2024-7654MEDIUM6.1
  • Progress OpenEdgeProgress OpenEdge
  • cpe:2.3:a:progress:openedge
NoYesSep 03, 2024
CVE-2024-7346MEDIUM4.8
  • Progress OpenEdgeProgress OpenEdge
  • cpe:2.3:a:progress:openedge
NoYesSep 03, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management