In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability.
References
| Link | Resource |
|---|---|
| https://docs.telerik.com/report-server/knowledge-base/insecure-type-resolution-cve-2024-8015 | Vendor Advisory |
Configurations
History
15 Oct 2024, 14:55
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Progress telerik Report Server
Progress |
|
| CPE | cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:* | |
| References | () https://docs.telerik.com/report-server/knowledge-base/insecure-type-resolution-cve-2024-8015 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
10 Oct 2024, 12:51
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Oct 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-09 15:15
Updated : 2024-10-15 14:55
NVD link : CVE-2024-8015
Mitre link : CVE-2024-8015
CVE.ORG link : CVE-2024-8015
JSON object : View
Products Affected
progress
- telerik_report_server
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
