CVE-2023-40051: CWE-434 Unrestricted Upload of File with Dangerous Type in Progress Software Corporation OpenEdge
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.
AI Analysis
Technical Summary
CVE-2023-40051 is a critical vulnerability identified in Progress Software Corporation's OpenEdge Application Server (PASOE), specifically affecting versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue arises from insufficient validation and restriction on file uploads via the WEB transport mechanism in PASOE. An attacker with at least low-level privileges (PR:L) can craft a malicious request that uploads arbitrary files to server directories on the system running PASOE. Because the vulnerability allows file uploads without proper checks on file type or content, an attacker could upload payloads containing malicious code or scripts. These payloads could then be executed or leveraged to further compromise the server or pivot within the network, potentially enabling larger scale attacks such as remote code execution, data exfiltration, or lateral movement. The CVSS v3.1 base score of 9.1 reflects the high severity, with network attack vector (AV:N), low attack complexity (AC:L), and no user interaction required (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Confidentiality impact is low (C:L), integrity impact is high (I:H), and availability impact is low (A:L). No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a significant risk if weaponized. The lack of patch links in the provided data suggests that organizations should verify the availability of updates directly from Progress Software and prioritize patching to mitigate this critical risk.
Potential Impact
For European organizations, the impact of CVE-2023-40051 can be substantial, especially for those relying on Progress OpenEdge for critical business applications, including ERP, financial systems, and supply chain management. Successful exploitation could lead to unauthorized modification of application data (high integrity impact), potentially causing data corruption, fraud, or operational disruption. The ability to upload malicious files may also facilitate the deployment of malware or ransomware, threatening availability and business continuity. Given the network-exploitable nature and no requirement for user interaction, attackers could remotely compromise systems, increasing the risk of widespread infection within enterprise networks. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as any breach involving personal or sensitive data could result in regulatory penalties and reputational damage. Additionally, the vulnerability could be leveraged as an initial foothold in targeted attacks against European organizations, especially those in manufacturing, finance, and public sectors where OpenEdge deployments are common. The absence of known exploits currently provides a window for proactive defense, but the critical severity score underscores the urgency of mitigation.
Mitigation Recommendations
1. Immediate patching: Organizations should promptly update PASOE to versions 11.7.18, 12.2.13, or later innovation releases where the vulnerability is addressed. 2. Restrict file upload permissions: Implement strict access controls on directories used by PASOE for file uploads, ensuring only authorized processes and users can write or execute files. 3. Web transport configuration: Review and harden the configuration of the WEB transport component to limit or disable file upload capabilities if not required by business processes. 4. Input validation and filtering: Deploy application-layer controls or web application firewalls (WAFs) to detect and block suspicious file upload attempts, particularly those with executable or script extensions. 5. Network segmentation: Isolate PASOE servers within secure network zones to limit lateral movement in case of compromise. 6. Monitoring and logging: Enable detailed logging of file upload activities and monitor for anomalous patterns indicative of exploitation attempts. 7. Incident response readiness: Prepare and test response plans for potential exploitation scenarios involving unauthorized file uploads. 8. Vendor communication: Maintain active communication with Progress Software for updates, patches, and advisories related to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2023-40051: CWE-434 Unrestricted Upload of File with Dangerous Type in Progress Software Corporation OpenEdge
Description
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.
AI-Powered Analysis
Technical Analysis
CVE-2023-40051 is a critical vulnerability identified in Progress Software Corporation's OpenEdge Application Server (PASOE), specifically affecting versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue arises from insufficient validation and restriction on file uploads via the WEB transport mechanism in PASOE. An attacker with at least low-level privileges (PR:L) can craft a malicious request that uploads arbitrary files to server directories on the system running PASOE. Because the vulnerability allows file uploads without proper checks on file type or content, an attacker could upload payloads containing malicious code or scripts. These payloads could then be executed or leveraged to further compromise the server or pivot within the network, potentially enabling larger scale attacks such as remote code execution, data exfiltration, or lateral movement. The CVSS v3.1 base score of 9.1 reflects the high severity, with network attack vector (AV:N), low attack complexity (AC:L), and no user interaction required (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Confidentiality impact is low (C:L), integrity impact is high (I:H), and availability impact is low (A:L). No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a significant risk if weaponized. The lack of patch links in the provided data suggests that organizations should verify the availability of updates directly from Progress Software and prioritize patching to mitigate this critical risk.
Potential Impact
For European organizations, the impact of CVE-2023-40051 can be substantial, especially for those relying on Progress OpenEdge for critical business applications, including ERP, financial systems, and supply chain management. Successful exploitation could lead to unauthorized modification of application data (high integrity impact), potentially causing data corruption, fraud, or operational disruption. The ability to upload malicious files may also facilitate the deployment of malware or ransomware, threatening availability and business continuity. Given the network-exploitable nature and no requirement for user interaction, attackers could remotely compromise systems, increasing the risk of widespread infection within enterprise networks. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as any breach involving personal or sensitive data could result in regulatory penalties and reputational damage. Additionally, the vulnerability could be leveraged as an initial foothold in targeted attacks against European organizations, especially those in manufacturing, finance, and public sectors where OpenEdge deployments are common. The absence of known exploits currently provides a window for proactive defense, but the critical severity score underscores the urgency of mitigation.
Mitigation Recommendations
1. Immediate patching: Organizations should promptly update PASOE to versions 11.7.18, 12.2.13, or later innovation releases where the vulnerability is addressed. 2. Restrict file upload permissions: Implement strict access controls on directories used by PASOE for file uploads, ensuring only authorized processes and users can write or execute files. 3. Web transport configuration: Review and harden the configuration of the WEB transport component to limit or disable file upload capabilities if not required by business processes. 4. Input validation and filtering: Deploy application-layer controls or web application firewalls (WAFs) to detect and block suspicious file upload attempts, particularly those with executable or script extensions. 5. Network segmentation: Isolate PASOE servers within secure network zones to limit lateral movement in case of compromise. 6. Monitoring and logging: Enable detailed logging of file upload activities and monitor for anomalous patterns indicative of exploitation attempts. 7. Incident response readiness: Prepare and test response plans for potential exploitation scenarios involving unauthorized file uploads. 8. Vendor communication: Maintain active communication with Progress Software for updates, patches, and advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2023-08-08T19:44:41.113Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dd85d182aa0cae24d8162
Added to database: 6/2/2025, 4:59:09 PM
Last enriched: 7/3/2025, 5:27:28 PM
Last updated: 8/14/2025, 11:42:53 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.