Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
References
Link | Resource |
---|---|
http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference | Mitigation Vendor Advisory |
http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/43874/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43874/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
22 Jan 2025, 19:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/43874/ - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference - Mitigation, Vendor Advisory |
28 Jun 2024, 13:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 | |
References | (EXPLOIT-DB) https://www.exploit-db.com/exploits/43874/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-08-23 17:29
Updated : 2025-03-14 20:05
NVD link : CVE-2017-11357
Mitre link : CVE-2017-11357
JSON object : View
Products Affected
telerik
- ui_for_asp.net_ajax
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type