漏洞信息详情
Progress Telerik UI for ASP.NET AJAX 代码问题漏洞
漏洞简介
Progress Telerik UI for ASP.NET AJAX是一款HTML编辑器。
Progress Telerik UI for ASP.NET AJAX 2019.3.1023及之前版本中的‘RadAsyncUpload’函数存在代码问题漏洞。远程攻击者可借助特制请求利用该漏洞在w3wp.exe进程上下文中执行任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization
参考网址
来源:MISC
链接:https://www.telerik.com/support/whats-new/aspnet-ajax/release-history/ui-for-asp-net-ajax-r1-2020-(version-2020-1-114)
来源:MISC
链接:https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html
来源:MISC
链接:https://www.telerik.com/support/whats-new/release-history
来源:MISC
链接:https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization
来源:MISC
链接:https://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html
来源:github.com
链接:https://github.com/bao7uo/RAU_crypto
来源:MISC
链接:https://github.com/noperator/CVE-2019-18935
来源:MISC
链接:https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-18935
来源:us-cert.cisa.gov
链接:https://us-cert.cisa.gov/ics/advisories/icsa-21-077-03
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0972
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Telerik-UI-for-ASP-NET-AJAX-code-execution-via-RadAsyncUpload-JavaScriptSerializer-Deserialization-31141
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html
受影响实体
暂无
补丁
- Progress Telerik UI for ASP.NET AJAX 代码问题漏洞的修复措施<!--2019-12-11-->
还没有评论,来说两句吧...