Article Details
Scrape Timestamp (UTC): 2024-07-26 04:14:12.988
Source: https://thehackernews.com/2024/07/critical-flaw-in-telerik-report-server.html
Original Article Text
Click to Toggle View
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk. Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw that could result in remote code execution. The vulnerability, tracked as CVE-2024-6327 (CVSS score: 9.9), impacts Report Server version 2024 Q2 (10.1.24.514) and earlier. "In Progress Telerik Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability," the company said in an advisory. Deserialization flaws occur when an application reconstructs untrusted data that an attacker has control over without adequate validation in place, resulting in the execution of unauthorized commands. Progress Software said the flaw has been addressed in version 10.1.24.709. As temporary mitigation, it's recommended to change the user for the Report Server Application Pool to one with limited permission. Administrators can check if their servers are vulnerable to attacks by going through these steps - The disclosure comes nearly two months after the company patched another critical shortcoming in the same software (CVE-2024-4358, CVSS score: 9.8) that could be abused by a remote attacker to bypass authentication and create rogue administrator users.
Daily Brief Summary
Progress Software discovered a critical remote code execution vulnerability in Telerik Report Server, urging updates to mitigate risk.
The flaw, identified as CVE-2024-6327 with a high CVSS score of 9.9, affects versions up to 2024 Q2 (10.1.24.514).
Attackers can exploit the vulnerability via insecure deserialization, allowing them to execute unauthorized commands remotely.
The vulnerability has been rectified in the newer version 10.1.24.709 of the software.
As an interim safety measure, changing the user for the Report Server Application Pool to one with restricted permissions is recommended.
Administrators are advised to verify their server's vulnerability status by following specific checking procedures outlined by Progress Software.
This announcement follows a recent patch for another severe vulnerability in the same Telerik software that permitted authentication bypass and unauthorized administrator account creation.