{"id":2051,"date":"2024-06-11T04:35:30","date_gmt":"2024-06-11T04:35:30","guid":{"rendered":"https:\/\/amaru.co.nz\/fj\/?post_type=threat-intelligence&p=2051"},"modified":"2024-07-12T00:11:44","modified_gmt":"2024-07-12T00:11:44","slug":"vulnerability-alert-cve-2024-4358-and-cve-2024-1800-affecting-progress-telerik-report-servers","status":"publish","type":"threat-intelligence","link":"https:\/\/amaru.co.nz\/fj\/blog\/threat-intelligence\/vulnerability-alert-cve-2024-4358-and-cve-2024-1800-affecting-progress-telerik-report-servers\/","title":{"rendered":"Vulnerability Alert: CVE-2024-4358 and CVE-2024-1800 affecting Progress Telerik Report Servers"},"content":{"rendered":"
AMARU would like to draw your attention to CVE-2024-4358 and CVE-2024-1800 affecting Progress Telerik Report Servers. The chaining of these two vulnerabilities can lead to unauthenticated remote code execution on vulnerable servers. We are aware of a publicly available proof of concept (PoC). <\/span><\/p>\n CVE-2024-4358 can allow an unauthenticated attacker to gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.<\/span>\u00a0<\/span><\/p>\n CVE-2024-1800 can lead to remote code execution through an insecure deserialisation vulnerability.<\/span><\/p>\n