FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 367500
Description

This outbreak alert on Progress Kemp LoadMaster covers vulnerability that is OS Command Injection Vulnerability.

 

CVE-2024-1212 is a critical vulnerability affecting the LoadMaster product by Progress (formerly Kemp Technologies). It's an unauthenticated, remote command injection flaw that allows attackers to execute arbitrary system commands by sending specially crafted API requests to the LoadMaster management interface. This vulnerability has been actively exploited in the wild, with attackers using it to gain initial access to systems and deploy ransomware.

 

This article describes the assessment of OS Command Injection vulnerability in Progress Kemp LoadMaster software.

Scope

FortiDAST Scripting Engine updated in version 24.4.0

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'progress-kemp' which will select the underlying script as per the scan requirement: 'CVE-2024-1212 Progress Kemp LoadMaster Command Injection Vulnerability.'

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:

https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors