- Print
- DarkLight
- PDF
Progress OpenEdge 11.7.20 contains fixes for several issues which include resolutions to vulnerabilities and general fixes.
Issues fixed in OpenEdge 11.7.20 (progress.com)
Known issues in OpenEdge 11.7.20 (progress.com)
Security Issue(s) and Potential Impact:
The Progress OpenEdge team has addressed several security vulnerabilities in the following OpenEdge products. Please refer to the following information for specific details and remediation steps.
Resolution:
If you are running OpenEdge 11.7.0 - 11.7.19, there is an update available in OpenEdge 11.7.20, with important security fixes. For more details, please refer to the Knowledge Base articles listed below.
If you are running an OpenEdge version that is retired as described in the OpenEdge Life Cycle, it is necessary to upgrade to an active OpenEdge instance, which for FIMS is OpenEdge 11.7.20. Currently, Progress OpenEdge 12.0 is not supported for use with FIMS.
OpenEdge Critical Alert: Unauthenticated Content Injection in OpenEdge Management web interface via ActiveMQ discovery service
Severity | Security Concern | Products Impacted | Knowledge Base Article |
Critical | ActiveMQ Discovery service was reachable by default on UDP port of an OEE/OEM installation and OEM Web Interface. | · OpenEdge Explorer (OEE) · OpenEdge Management (OEM) · OpenEdge AdminServer · OpenEdge Authentication Gateway |
OpenEdge Product Alert: Client connections using default TLS certificates from OpenEdge may bypass TLS host name validation
Severity | Security Concern | Products Impacted | Knowledge Base Article |
High | Client connections can bypass certificate host name validation when OpenEdge default certificates are used as part of the TLS handshake for a networked OpenEdge connection. | · All components with TLS/SSL-enabled connectivity that use OpenEdge default certificates |
OpenEdge Product Alert: Direct local client connections to MS Agents can bypass authentication
Severity | Security Concern | Products Impacted | Knowledge Base Article |
High | A local OpenEdge client can connect directly to a MS Agent and perform requests that bypass required PASOE security checks. | · All ABL and SQL client connections to the PASOE web server and including .NET and Java Open Clients |
OpenEdge Critical Alert: OpenEdge Third-Party Vulnerabilities Fixed In OpenEdge LTS Update 11.7.20
Severity | Security Concern | Products Impacted | Knowledge Base Article |
Critical and High | Multiple vulnerable third-party library vulnerabilities. | · Multiple OpenEdge Components Affected |