CVE-2025-10703
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: Progress Software Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| progress | data_direct_connect_for_jdbc | 6.0.0.001438 |
| progress | data_direct_hybrid_data_pipeline_on_premises_connector | 4.6.2.1223 |
| progress | data_direct_connect_for_jdbc | 6.1.0.001654 |
| progress | data_direct_connect_for_jdbc | 5.1.4.000161 |
| progress | data_direct_hybrid_data_pipeline_docker | 4.6.2.3316 |
| progress | data_direct_openaccess_jdbc_driver | 8.1.0.0177 |
| progress | data_direct_openaccess_jdbc_driver | 9.0.0.0019 |
| progress | data_direct_connect_for_jdbc | 6.0.1.001821 |
| progress | data_direct_connect_for_jdbc | 6.0.0.000805 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001747 |
| progress | data_direct_hybrid_data_pipeline_server | 4.6.2.3309 |
| progress | data_direct_connect_for_jdbc | 6.0.1.001499 |
| progress | data_direct_connect_for_jdbc | 6.0.0.000717 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001559 |
| progress | data_direct_connect_for_jdbc | 6.0.0.000454 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001936 |
| progress | data_direct_connect_for_jdbc | 6.0.1.001222 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001155 |
| progress | data_direct_connect_for_jdbc | 6.0.0.002279 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001392 |
| progress | data_direct_connect_for_jdbc | 6.0.1.006961 |
| progress | data_direct_connect_for_jdbc | 5.1.4.000298 |
| progress | data_direct_hybrid_data_pipeline_jdbc_driver | 4.6.2.0607 |
| progress | data_direct_connect_for_jdbc | 5.1.4.000187 |
| progress | data_direct_connect_for_jdbc | 6.0.1.001818 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001225 |
| progress | data_direct_connect_for_jdbc | 5.1.4.000330 |
| progress | data_direct_connect_for_jdbc | 6.0.0.003020 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001712 |
| progress | data_direct_connect_for_jdbc | 6.0.0.001843 |
| progress | data_direct_connect_for_jdbc | 6.0.0.003161 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Code Injection issue in Progress DataDirect JDBC drivers and Hybrid Data Pipeline. It arises because the SpyAttribute connection option allows specifying an arbitrary file for logging. An attacker can exploit this by causing JavaScript code to be written into a log file. If the log file is placed in a location and with an extension that the application server serves as a resource, the attacker can then retrieve and execute the malicious JavaScript code on the server, leading to remote code execution.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary JavaScript code remotely by injecting it into log files that the server then serves as resources. This can lead to remote code execution, potentially compromising the application server, stealing sensitive data, or performing unauthorized actions within the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the affected Progress DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver, and DataDirect OpenAccess JDBC driver to the fixed versions listed in the CVE description. Avoid allowing end users to specify values for the SpyAttributes connection option, especially the log=(file) construct, to prevent arbitrary file writing and potential remote code inclusion.