QID 731285

Date Published: 2024-03-21

QID 731285: Progress Kemp LoadMaster Unauthenticated Command Injection Vulnerability

Progress Kemp LoadMaster is vulnerable to unauthenticated command injection vulnerability. It is possible for unauthenticated, remote attackers who have access to the management interface of LoadMaster to issue a carefully crafted API command that will allow arbitrary system commands to be executed without authentication.

Affected Versions:
All LoadMaster releases after v7.2.48.1

Patched Versions:
LoadMaster 7.2.59.2 (GA)
LoadMaster 7.2.54.8 (LTSF)
LoadMaster 7.2.48.10 (LTS)

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable Progress Kemp LoadMaster installations by sending a crafted payload as an HTTP GET request. The payload is passed in the 'Authorization' header and tries to execute system commands like 'id' and 'cat /etc/passwd'.

Successful exploitation of the vulnerability may allow unauthenticated remote attackers to access the system through the LoadMaster management interface, enabling arbitrary system command execution.

  • CVSS V3 rated as Critical - 10 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to the latest version of the Kemp LoadMaster. For more information, please refer to the Progress Kemp LoadMaster Security Advisory

    CVEs related to QID 731285

    Software Advisories
    Advisory ID Software Component Link
    Kemp LoadMaster Security Advisory URL Logo support.kemptechnologies.com/hc/en-us/articles/23878931058445-LoadMaster-Security-Vulnerability-CVE-2024-1212