# N/A
## 漏洞概述
Telerik.Web.UI在Progress Telerik UI for ASP.NET AJAX中的RadAsyncUpload加密机制存在弱点,导致远程攻击者可以执行任意文件上传或执行任意代码。
## 影响版本
- R1 2017之前的版本
- R2 2017 SP2之前的R2版本
## 细节
Telerik.Web.UI组件中的RadAsyncUpload功能使用了弱加密机制,使得未经授权的攻击者能够上传任意文件或执行任意代码。
## 影响
此漏洞可能导致未授权的远程攻击者上传恶意文件或执行任意代码,从而威胁系统的安全性和完整性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935) | https://github.com/bao7uo/RAU_crypto | POC详情 |
2 | Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX, | https://github.com/KasunPriyashan/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut | POC详情 |
3 | Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935) | https://github.com/KasunPriyashan/Telerik-UI-ASP.NET-AJAX-Exploitation | POC详情 |
4 | None | https://github.com/hlong12042/CVE-2017-11317-and-CVE-2017-11357-in-Telerik | POC详情 |
暂无评论