CVE-2017-11317
KEV
🔴 Łataj teraz
Słaba kryptografia w Telerik.Web.UI umożliwia zdalne przesyłanie plików i wykonanie kodu.
CVSS
9.8
EPSS
92.0%
Exploit
weaponized
Vendor
telerik
Opis źródłowy (NVD)
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 92.0% |
| Opublikowano (NVD) | 2017-08-23 17:29:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 17:42:51 UTC |
Referencje
- http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/unrestricted-file-upload (cve@mitre.org) [Mitigation, Vendor Advisory]
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0006 (cve@mitre.org) [Third Party Advisory]
- https://www.exploit-db.com/exploits/43874/ (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-11317 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]