5 results (0.009 seconds)

CVSS: 9.8EPSS: 94%CPEs: 1EXPL: 15

11 Dec 2019 — Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.) • https://packetstorm.news/files/id/159653 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 93%CPEs: 3EXPL: 5

23 Aug 2017 — Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. Telerik.Web.UI en Progress Telerik UI for ASP.NET AJAX en versiones anteriores a la R1 2017 y R2 en versiones anteriores a la R2 2017 SP2 emplea un cifrado RadAsyncUpload débil, lo que permite que atacantes remotos realicen subidas de archivos arbitrarios o ejecuten código arbitrario. Te... • https://packetstorm.news/files/id/159653 • CWE-326: Inadequate Encryption Strength •

CVSS: 9.8EPSS: 95%CPEs: 1EXPL: 2

23 Aug 2017 — Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. Progress Telerik UI para ASP.NET AJAX en versiones anteriores a la R2 2017 SP2 no restringe correctamente las entradas por parte de un usuario en RadAsyncUpload, lo que permite que atacantes remotos realicen subidas de archivos arbitrarios o ejecuten código arbitrario. A potential vulnerability has been ide... • https://www.exploit-db.com/exploits/43874 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 8%CPEs: 2EXPL: 8

03 Jul 2017 — Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise. La biblioteca Telerik.Web.UI.dll en la Interfaz de Usuario de Progress Telerik para ASP.NET AJAX anterior a la vers... • https://www.exploit-db.com/exploits/43873 • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

25 Dec 2014 — Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value. Vulnerabilidad de salto en las rutas absolutas en el control RadAsyncUpload en RadControls en Telerik UI de ASP.NET AJAX anterior a Q3 2012 SP2 permite a atacantes remotos escribir en archivos arbitrarios, y consecuentemente ejec... • http://itq.nl/arbitrary-file-write-in-telerik-ui-for-asp-net-ajax • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •