CVE-2023-40051
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to Progress Application Server (PAS) for OpenEdge via the WEB transport. Affected organizations using vulnerable versions of PASOE could have their servers compromised, potentially leading to further network attacks.
💻 Affected Systems
- Progress Application Server (PAS) for OpenEdge
📦 What is this software?
Openedge by Progress
Openedge by Progress
⚠️ Risk & Real-World Impact
Worst Case
Complete server takeover leading to ransomware deployment, data exfiltration, or lateral movement across the network
Likely Case
Webshell deployment allowing persistent access, data theft, or use as attack platform
If Mitigated
Limited impact due to network segmentation, file upload restrictions, or proper patching
🎯 Exploit Status
WEB transport vulnerability suggests straightforward exploitation via HTTP requests
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.7.18, 12.2.13, 12.8.0
Restart Required: Yes
Instructions:
1. Download appropriate patch version from Progress support portal. 2. Backup current installation. 3. Apply patch following vendor documentation. 4. Restart PASOE services. 5. Verify successful update.
🔧 Temporary Workarounds
Disable WEB Transport
allTemporarily disable vulnerable WEB transport if not required
Modify PASOE configuration to disable WEB transport
Implement WAF Rules
allBlock suspicious file upload patterns at web application firewall
Configure WAF to block requests with file upload patterns to PASOE endpoints
🧯 If You Can't Patch
- Implement strict network segmentation to isolate PASOE servers
- Deploy file integrity monitoring and restrict write permissions to server directories
🔍 How to Verify
Check if Vulnerable:
Check PASOE version against affected ranges and verify WEB transport is enabled
Check Version:
openedge -v or check PASOE administration console
Verify Fix Applied:
Confirm version is 11.7.18, 12.2.13, or 12.8.0+ and test file upload functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload patterns in PASOE logs
- Unexpected file creation in server directories
Network Indicators:
- HTTP POST requests with file uploads to PASOE WEB endpoints
- Unusual outbound connections from PASOE server
SIEM Query:
source="PASOE" AND (event="file_upload" OR event="file_write") AND file_extension IN ("jsp", "php", "asp", "aspx", "war", "jar")
🔗 References
- https://community.progress.com/s/article/Important-Progress-OpenEdge-Critical-Alert-for-Progress-Application-Server-in-OpenEdge-PASOE-Arbitrary-File-Upload-Vulnerability-in-WEB-Transport
- https://www.progress.com/openedge
- https://community.progress.com/s/article/Important-Progress-OpenEdge-Critical-Alert-for-Progress-Application-Server-in-OpenEdge-PASOE-Arbitrary-File-Upload-Vulnerability-in-WEB-Transport
- https://www.progress.com/openedge