In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.
References
Link | Resource |
---|---|
https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 | Vendor Advisory |
Configurations
History
26 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory | |
First Time |
Progress
Progress telerik Reporting |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* |
24 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-24 14:15
Updated : 2024-07-26 12:57
NVD link : CVE-2024-6096
Mitre link : CVE-2024-6096
CVE.ORG link : CVE-2024-6096
JSON object : View
Products Affected
progress
- telerik_reporting
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')