Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
References
Link | Resource |
---|---|
http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/43874/ | Exploit Third Party Advisory VDB Entry |
http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/43874/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference - Mitigation, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/43874/ - Exploit, Third Party Advisory, VDB Entry |
28 Jun 2024, 13:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/43874/ - Exploit, Third Party Advisory, VDB Entry | |
CWE | CWE-434 |
Information
Published : 2017-08-23 17:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11357
Mitre link : CVE-2017-11357
CVE.ORG link : CVE-2017-11357
JSON object : View
Products Affected
telerik
- ui_for_asp.net_ajax
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type