According to its self-reported version number, the version of Telerik UI for ASP.NET AJAX is affected by multiple vulnerabilities in Telerik.Web.UI.dll :
An insecure direct object reference vulnerability due to user input used directly by RadAsyncUpload without modification or validation. (CVE-2017-11357)
An unrestricted file upload due to weak encryption used in old versions of Telerik.Web.UI to encrypt data used by RadAsyncUpload. (CVE-2017-11317) An unauthenticated, remote attacker can exploit this, via specially crafted data, to execute arbitrary code.
Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
Vendor | Product | Version | CPE |
---|---|---|---|
telerik | ui_for_asp.net_ajax | * | cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:* |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11317
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11357
docs.telerik.com/devtools/aspnet-ajax/controls/asyncupload/security
www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/insecure-direct-object-reference
www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/unrestricted-file-upload