### [CVE-2024-4358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4358) ![](https://img.shields.io/static/v1?label=Product&message=Telerik%20Report%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%2010.1.24.514%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/GhostTroops/TOP - https://github.com/Harydhk7/CVE-2024-4358 - https://github.com/Ostorlab/KEV - https://github.com/RevoltSecurities/CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit - https://github.com/f0ur0four/Insecure-Deserialization - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/securitycipher/daily-bugbounty-writeups - https://github.com/sinsinology/CVE-2024-4358 - https://github.com/tanjiti/sec_profile - https://github.com/verylazytech/CVE-2024-4358 - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki