cve/2024/CVE-2024-4358.md

30 lines
1.3 KiB
Markdown
Raw Normal View History

2024-06-07 04:52:01 +00:00
### [CVE-2024-4358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4358)
![](https://img.shields.io/static/v1?label=Product&message=Telerik%20Report%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%2010.1.24.514%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/GhostTroops/TOP
2024-06-08 09:32:58 +00:00
- https://github.com/Harydhk7/CVE-2024-4358
2024-06-22 09:37:59 +00:00
- https://github.com/Ostorlab/KEV
2024-06-08 09:32:58 +00:00
- https://github.com/RevoltSecurities/CVE-2024-4358
- https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit
2024-06-07 04:52:01 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/securitycipher/daily-bugbounty-writeups
- https://github.com/sinsinology/CVE-2024-4358
- https://github.com/tanjiti/sec_profile
2024-06-10 07:22:43 +00:00
- https://github.com/verylazytech/CVE-2024-4358
2024-06-23 04:42:52 +00:00
- https://github.com/wjlin0/poc-doc
2024-06-08 09:32:58 +00:00
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
2024-06-07 04:52:01 +00:00