CVE-2024-6096

In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*

History

25 Apr 2025, 23:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250425-0003/ -

21 Nov 2024, 09:48

Type Values Removed Values Added
References () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

26 Jul 2024, 12:57

Type Values Removed Values Added
First Time Progress
Progress telerik Reporting
CPE cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*
References () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory
Summary
  • (es) En las versiones de Progress® Telerik® Reporting anteriores a 18.1.24.709, es posible un ataque de ejecución de código mediante inyección de objetos a través de una vulnerabilidad de resolución de tipo inseguro.
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.8

24 Jul 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-24 14:15

Updated : 2025-04-25 23:15


NVD link : CVE-2024-6096

Mitre link : CVE-2024-6096

CVE.ORG link : CVE-2024-6096


JSON object : View

Products Affected

progress

  • telerik_reporting
CWE
CWE-470

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')