

THE TERM “PROMPTLY” AS USED HEREIN SHALL MEAN NO LATER THAN SIXTY (60) DAYS FOLLOWING THE DELIVERY OF THE PRODUCT TO YOU.ġ.1 For purposes of this Agreement, “Progress” refers to Progress Software Corporation and “you” or “Licensee” refers to the individual installing or using the Product(s), if you are acting as an individual on your own behalf otherwise, “you” or “Licensee” means the business or other entity for which you are obtaining the Product(s) and that will exercise the rights granted under this Agreement. IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, DO NOT PROCEED WITH THE INSTALLATION OF THE PRODUCT(S) AND PROMPTLY RETURN THE PRODUCT(S), DOCUMENTATION, AND ALL COPIES THEREOF TO the supplier fROM which it was acquired FOR A FULL REFUND OF THE LICENSE FEES, IF ANY, PAID FOR THE PRODUCT(S).


BY ACCEPTING THIS AGREEMENT YOU ARE CONSENTING TO BE BOUND BY THE TERMS AND CONDITIONS CONTAINED HEREIN AND ACKNOWLEDGING YOUR AUTHORITY TO DO SO ON BEHALF OF YOUR COMPANY (IF APPLICABLE). The upgrade is hosted for download at : YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS OF THIS end user license AGREEMENT BEFORE INSTALLING OR USING THE PRODUCT AND DOCUMENTATION TO WHICH THIS AGREEMENT RELATES. Upgrading to version 11.7.14 or 12.2.9 eliminates this vulnerability. This vulnerability is assigned to T1222 by the MITRE ATT&CK project. The technical details are unknown and an exploit is not available. This vulnerability is handled as CVE-2022-29849 since. Impacted is confidentiality, integrity, and availability. The software does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended. Using CWE to declare the problem leads to CWE-281. The manipulation with an unknown input leads to a permissions vulnerability.

Affected by this issue is an unknown part of the component SUID Binary Handler. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in Progress OpenEdge up to 11.7.13/12.2.8. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
