The Progress Telerik Report Server pre-authenticated Remote Code Execution (RCE) chain, identified as CVE-2024-4358 and CVE-2024-1800, involves a critical vulnerability that allows unauthenticated attackers to execute arbitrary code on affected servers. Attack Flow 📌Initial Access: The attacker identifies a vulnerable Telerik Report Server instance. 📌Exploitation of CVE-2024-4358: The attacker sends a crafted request to the /Startup/Register endpoint to create a new administrator account. 📌Privilege Escalation: The attacker logs in using the newly created administrator account. 📌Exploitation of CVE-2024-1800: The attacker creates a malicious report that exploits the deserialization vulnerability to execute arbitrary code. 📌Command Execution: The attacker executes arbitrary commands on the server, achieving remote code execution. Attack Scenario Target Identification: 📌The attacker identifies a vulnerable instance of the Telerik Report Server, typically by scanning for publicly ex
Skipping Authentication: Telerik Report Server’s New Feature?
26 июля 202426 июл 2024
2 мин