CISA KEV 정보
| 취약점명 | Progress Telerik UI for ASP.NET AJAX and Sitefinity Cryptographic Weakness Vulnerability |
|---|---|
| 설명 | Progress Telerik UI for ASP.NET AJAX and Sitefinity have a cryptographic weakness in Telerik.Web.UI.dll that can be exploited to disclose encryption keys (Telerik.Web.UI.DialogParametersEncryptionKey and/or the MachineKey), perform cross-site-scripting (XSS) attacks, compromise the ASP.NET ViewState, and/or upload and download files. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-522 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2017-9248 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P설명: Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
CWE: CWE-522 | CWE-522
참조
- http://www.securityfocus.com/bid/99965 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.telerik.com/blogs/security-alert-for-telerik-ui-for-asp.net-ajax-and-progress-sitefinity [Vendor Advisory]
- http://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness [Mitigation, Vendor Advisory]
- https://www.exploit-db.com/exploits/43873/ [Exploit, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/99965 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.telerik.com/blogs/security-alert-for-telerik-ui-for-asp.net-ajax-and-progress-sitefinity [Vendor Advisory]
- http://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness [Mitigation, Vendor Advisory]
- https://www.exploit-db.com/exploits/43873/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9248
This product uses the NVD API but is not endorsed or certified by the NVD.