Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.PROGRESS_TELERIK_REPORTING_18_1_24_514.NASL
HistoryMay 17, 2024 - 12:00 a.m.

Progress Telerik Reporting < 2024 Q2 (18.1.24.514) Multiple Vulnerabilities

2024-05-1700:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
telerik reporting
vulnerabilities
code execution
deserialization
instantiation
cve-2024-4200
cve-2024-4202
windows host
nessus scanner

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

The version of Progress Telerik Reporting installed on the remote Windows host is prior to 2024 Q2 (18.1.24.514). It is, therefore, affected by multiple vulnerabilities:

  • In Progress Telerik Reporting versions prior to 2024 Q2 (18.1.24.514), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability. (CVE-2024-4200)

  • In Progress Telerik Reporting versions prior to 2024 Q2 (18.1.24.514), a code execution attack is possible through an insecure instantiation vulnerability. (CVE-2024-4202)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(197298);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/20");

  script_cve_id("CVE-2024-4200", "CVE-2024-4202");
  script_xref(name:"IAVB", value:"2024-B-0060");

  script_name(english:"Progress Telerik Reporting < 2024 Q2 (18.1.24.514) Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote Windows host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Progress Telerik Reporting installed on the remote Windows host is prior to 2024 Q2 (18.1.24.514). It
is, therefore, affected by multiple vulnerabilities:

  - In Progress Telerik Reporting versions prior to 2024 Q2 (18.1.24.514), a code execution attack is possible by a
    local threat actor through an insecure deserialization vulnerability. (CVE-2024-4200)

  - In Progress Telerik Reporting versions prior to 2024 Q2 (18.1.24.514), a code execution attack is possible through
    an insecure instantiation vulnerability. (CVE-2024-4202)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://docs.telerik.com/reporting/knowledge-base/deserialization-vulnerability-cve-2024-4200
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?51e6a156");
  # https://docs.telerik.com/reporting/knowledge-base/instantiation-vulnerability-cve-2024-4202
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8925f693");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Progress Telerik Reporting 2024 Q2 (18.1.24.514) or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-4200");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2024-4202");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/15");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/17");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:progress:telerik_reporting");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("progress_telerik_reporting_win_installed.nbin");
  script_require_keys("installed_sw/Progress Telerik Reporting", "SMB/Registry/Enumerated");

  exit(0);
}

include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');

var app_info = vcf::get_app_info(app:'Progress Telerik Reporting', win_local:TRUE);

var constraints = [
  { 'fixed_version' : '18.1.24.514' }
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_HOLE
);
VendorProductVersionCPE
progresstelerik_reportingcpe:/a:progress:telerik_reporting

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

Related for PROGRESS_TELERIK_REPORTING_18_1_24_514.NASL