Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-18935
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Progress Telerik UI for ASP.NET AJAX 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Progress Telerik UI for ASP.NET AJAX是一款HTML编辑器。 Progress Telerik UI for ASP.NET AJAX 2019.3.1023及之前版本中的‘RadAsyncUpload’函数存在代码问题漏洞。远程攻击者可借助特制请求利用该漏洞在w3wp.exe进程上下文中执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2019-18935
#POC DescriptionSource LinkShenlong Link
1RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.https://github.com/noperator/CVE-2019-18935POC Details
2TelerikUI Vulnerability Scanner (CVE-2019-18935)https://github.com/becrevex/Telerik_CVE-2019-18935POC Details
3TelerikUI Vulnerability Scanner (CVE-2019-18935)https://github.com/ThanHuuTuan/Telerik_CVE-2019-18935POC Details
4This project for CVE-2019-18935https://github.com/ThanHuuTuan/CVE_2019_18935POC Details
5[CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserializationhttps://github.com/murataydemir/CVE-2019-18935POC Details
6TelerikUI Vulnerability Scanner (CVE-2019-18935)https://github.com/appliedi/Telerik_CVE-2019-18935POC Details
7CVE-2019-18935https://github.com/random-robbie/CVE-2019-18935POC Details
8Nonehttps://github.com/0xAgun/CVE-2019-18935-checkerPOC Details
9Nonehttps://github.com/dust-life/CVE-2019-18935-memShellPOC Details
10CVE-2019-18935: Remote Code Executionhttps://github.com/clarkvoss/telerikPOC Details
11Nonehttps://github.com/ekkoo-z/CVE-2019-18935-bypasswafPOC Details
12Telerik CVE-2019-18935 Vulnerability Scannerhttps://github.com/0xsharz/telerik-scanner-CVE-2019-18935POC Details
13In-depth study of CVE-2019-18935 affecting Telerik UI for ASP.NET AJAX. Covers .NET deserialization vulnerability, RadAsyncUpload handler, gadget chains, mixed-mode assembly exploitation, and mitigation strategies.https://github.com/quyt0/CVE-2019-18935-exploit-studyPOC Details
14Exploit for CVE-2019-18935https://github.com/menashe12346/CVE-2019-18935POC Details
15Nonehttps://github.com/alanbarret/CVE-2019-18935POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-18935
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-18935
Anonymous User
2025-08-25 09:40:13

katana


Leave a comment