Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload

description-logoDescription

This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in Telerik UI for ASP.NET AJAX components.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted SMTP request. An unauthenticated remote attacker may be able to exploit this to upload an arbitrary file, leading to a possible code execution condition.

description-logoOutbreak Alert

Versions prior to R1 2020 (2020.1.114) are susceptible to remote code execution attacks on affected web servers of Telerik User Interface (UI) for ASP-NET due to a deserialization vulnerability found in RadAsyncUpload function. FortiGuard Labs continue seeing high exploitation activity of these old vulnerabilities.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Telerik UI for ASP.NET AJAX between Q1 2011 (2011.1.315) and R3 2016 SP2 (2016.3.1027)
Telerik UI for ASP.NET AJAX between R1 2017 (2017.1.118) and R2 2017 SP1 (2017.2.621)
Telerik UI for ASP.NET AJAX between R2 2017 SP2 (2017.2.711) and R3 2019 (2019.3.917)
Telerik UI for ASP.NET AJAX R3 2019 SP1 (2019.3.1023) and later

Impact logoImpact

System Compromise: Remote attackers can execute arbitrary code on vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.telerik.com/support/kb/aspnet-ajax/upload-(async)/details/unrestricted-file-upload

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-05-06 15.838 Default_action:pass:drop
2020-05-06 15.837 Default_action:drop:pass
2020-05-06 15.836 Default_action:pass:drop
2020-04-20 15.822 Sig Added
2020-04-16 15.819