CVE-2019-19790

Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server through a specially crafted request. NOTE: RadChart was discontinued in 2014 in favor of RadHtmlChart. All RadChart versions were affected. To avoid this vulnerability, you must remove RadChart's HTTP handler from a web.config (its type is Telerik.Web.UI.ChartHttpHandler).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:telerik:radchart:*:*:*:*:*:*:*:*
cpe:2.3:a:telerik:ui_for_asp.net_ajax:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () https://docs.telerik.com/devtools/aspnet-ajax/controls/chart/overview - Vendor Advisory () https://docs.telerik.com/devtools/aspnet-ajax/controls/chart/overview - Vendor Advisory
References () https://www.telerik.com/forums/-620f6977edef - Vendor Advisory () https://www.telerik.com/forums/-620f6977edef - Vendor Advisory
References () https://www.telerik.com/forums/path-traversal-vulnerability-in-radchart-image-handler - Vendor Advisory () https://www.telerik.com/forums/path-traversal-vulnerability-in-radchart-image-handler - Vendor Advisory

Information

Published : 2019-12-13 18:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19790

Mitre link : CVE-2019-19790

CVE.ORG link : CVE-2019-19790


JSON object : View

Products Affected

telerik

  • radchart
  • ui_for_asp.net_ajax
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')