CISA KEV 정보
| 취약점명 | Telerik UI for ASP.NET AJAX Insecure Direct Object Reference Vulnerability |
|---|---|
| 설명 | Telerik UI for ASP.NET AJAX contains an insecure direct object reference vulnerability in RadAsyncUpload that can result in file uploads in a limited location and/or remote code execution. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-20 |
| 등록일 (KEV) | 2023-01-26 |
| 조치 기한 | 2023-02-16 |
| 추가 참고 | https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/asyncupload-insecure-direct-object-reference; https://nvd.nist.gov/vuln/detail/CVE-2017-11357 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P설명: Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CWE: CWE-434 | CWE-434
참조
- http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference [Mitigation, Vendor Advisory]
- https://www.exploit-db.com/exploits/43874/ [Exploit, Third Party Advisory, VDB Entry]
- http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference [Mitigation, Vendor Advisory]
- https://www.exploit-db.com/exploits/43874/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-11357
This product uses the NVD API but is not endorsed or certified by the NVD.