In Progress® Telerik® Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability.
References
Link | Resource |
---|---|
https://docs.telerik.com/report-server/knowledge-base/deserialization-vulnerability-cve-2024-6327 | Vendor Advisory |
https://www.telerik.com/report-server | Product |
Configurations
History
26 Jul 2024, 13:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:* | |
First Time |
Progress telerik Report Server
Progress |
|
References | () https://docs.telerik.com/report-server/knowledge-base/deserialization-vulnerability-cve-2024-6327 - Vendor Advisory | |
References | () https://www.telerik.com/report-server - Product | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
24 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-24 14:15
Updated : 2024-07-26 13:03
NVD link : CVE-2024-6327
Mitre link : CVE-2024-6327
CVE.ORG link : CVE-2024-6327
JSON object : View
Products Affected
progress
- telerik_report_server
CWE
CWE-502
Deserialization of Untrusted Data