CVE-2024-6096

In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*

History

26 Jul 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) En las versiones de Progress® Telerik® Reporting anteriores a 18.1.24.709, es posible un ataque de ejecución de código mediante inyección de objetos a través de una vulnerabilidad de resolución de tipo inseguro.
First Time Progress
Progress telerik Reporting
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*
References () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory

24 Jul 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-24 14:15

Updated : 2024-07-26 12:57


NVD link : CVE-2024-6096

Mitre link : CVE-2024-6096

CVE.ORG link : CVE-2024-6096


JSON object : View

Products Affected

progress

  • telerik_reporting
CWE
CWE-470

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')