Progress Software has issued a security update to address a critical flaw tracked as CVE-2024-7591 in its LoadMaster and Multi-Tenant Hypervisor products. The vulnerability, rated with a maximum severity CVSS score of 10.0, arises from improper input validation, which can lead to OS command injection. This flaw allows unauthenticated remote attackers who have access to the management interface of LoadMaster to send specially crafted HTTP requests, enabling the execution of arbitrary system commands. The issue affects LoadMaster versions 7.2.60.0 and earlier, and Multi-Tenant Hypervisor versions 7.1.35.11 and older.
The flaw was discovered by security researcher Florian Grunow, who reported the issue to Progress Software. While no exploitation of the vulnerability has been observed in the wild, the company has recommended that users immediately apply the security patch to secure their systems. The update works by sanitizing user input to prevent the injection of arbitrary commands and mitigate the associated risks.
Progress Software urges all affected customers to upgrade to the latest version of their products to address the vulnerability. The update can be easily applied by navigating to the System Configuration section of the management interface, where users can follow the steps to install the add-on package. Customers are also encouraged to follow Progress Software’s security hardening guidelines to further secure their environments.
The company has stressed the importance of addressing this issue swiftly, given the severity of the vulnerability and the potential risks it poses to systems. As the flaw allows remote code execution through command injection, it could potentially give attackers full control over affected systems. By applying the updates, users can ensure their systems are protected from this critical security threat.
Reference: