exploitdb
WORKING POC
by Bishop Fox · textwebappsaspx
https://www.exploit-db.com/exploits/47793
This exploit leverages insecure deserialization in Telerik UI's RadAsyncUpload component to achieve remote code execution by uploading and loading a malicious DLL payload. The PoC includes encryption logic to manipulate file upload configurations and trigger deserialization.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX (RadAsyncUpload)
No auth needed
Prerequisites:
Write permissions on the target server · Visual Studio for compiling the DLL payload · PyCryptodome for encryption logic
nomisec
WORKING POC
367 stars
by noperator · remote
https://github.com/noperator/CVE-2019-18935
This repository contains a functional exploit for CVE-2019-18935, a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. The exploit includes code to upload a payload and trigger deserialization for remote code execution.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX
No auth needed
Prerequisites:
Access to the target URL · Mixed-mode assembly DLL payload
nomisec
WORKING POC
182 stars
by bao7uo · poc
https://github.com/bao7uo/RAU_crypto
This repository contains a functional exploit for CVE-2019-18935, targeting Telerik Web UI for ASP.NET AJAX. The exploit leverages hardcoded encryption keys and insecure direct object references to achieve arbitrary file upload and .NET deserialization attacks.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Telerik Web UI for ASP.NET AJAX (versions before R3 2019 SP1)
No auth needed
Prerequisites:
Access to hardcoded or custom encryption keys · Target running vulnerable Telerik Web UI version
nomisec
WORKING POC
16 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2019-18935
This repository provides a functional exploit for CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. It includes detailed steps for verification and exploitation, along with C code for generating malicious DLLs for both safe (Sleep) and aggressive (reverse shell) testing.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler)
No auth needed
Prerequisites:
Access to the target server's Telerik.Web.UI.WebResource.axd endpoint · Ability to compile C code into a DLL
nomisec
WORKING POC
12 stars
by dust-life · poc
https://github.com/dust-life/CVE-2019-18935-memShell
This repository contains a functional exploit for CVE-2019-18935, which targets Telerik UI for ASP.NET AJAX. The exploit leverages a .NET deserialization vulnerability to load a malicious assembly into memory, achieving remote code execution (RCE) by creating a memory-resident shell.
Classification
Working Poc 90%
Target:
Telerik UI for ASP.NET AJAX (versions affected by CVE-2019-18935)
No auth needed
Prerequisites:
Access to a vulnerable Telerik UI instance · Ability to upload or execute a malicious DLL
nomisec
SCANNER
12 stars
by ThanHuuTuan · remote
https://github.com/ThanHuuTuan/Telerik_CVE-2019-18935
This repository contains a Python script and an NSE script for scanning Telerik UI for ASP.NET AJAX for CVE-2019-18935, a .NET deserialization vulnerability in the RadAsyncUpload function. The script checks for the presence of the vulnerable module and version but does not include exploit code.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Telerik UI for ASP.NET AJAX through 2019.3.1023
No auth needed
Prerequisites:
Presence of CVE-2017-11317 or CVE-2017-11357 to know encryption keys
nomisec
WORKING POC
8 stars
by ekkoo-z · remote
https://github.com/ekkoo-z/CVE-2019-18935-bypasswaf
This repository contains a functional exploit for CVE-2019-18935, targeting Telerik Web UI for ASP.NET AJAX. The exploit leverages hardcoded encryption keys and insecure direct object references to achieve arbitrary file upload and .NET deserialization, bypassing WAF protections.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Telerik Web UI for ASP.NET AJAX (versions before 2017 patches and some later versions with custom keys)
No auth needed
Prerequisites:
Access to the target application · Knowledge of custom encryption keys if patched versions are used
nomisec
STUB
5 stars
by random-robbie · poc
https://github.com/random-robbie/CVE-2019-18935
The repository contains only a minimal README with the CVE identifier and no exploit code, technical details, or functional content. It lacks any meaningful analysis or proof-of-concept implementation.
Target:
unknown
No auth needed
nomisec
WORKING POC
2 stars
by ThanHuuTuan · remote
https://github.com/ThanHuuTuan/CVE_2019_18935
This repository contains a functional exploit for CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. The exploit includes encryption routines and payload delivery mechanisms to achieve remote code execution via insecure deserialization.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX
No auth needed
Prerequisites:
Access to the target URL with Telerik.Web.UI.WebResource.axd endpoint · Knowledge of the target's .NET version and Telerik UI version
nomisec
SUSPICIOUS
1 stars
by KasunPriyashan · poc
https://github.com/KasunPriyashan/Telerik-UI-ASP.NET-AJAX-Exploitation
The repository claims to cover CVE-2019-18935 (RCE via insecure deserialization) and CVE-2017-11317 (unrestricted file upload) but contains no exploit code, technical details, or proof-of-concept. The README is a placeholder with no substance.
Classification
Suspicious 90%
Attack Type
Deserialization
Target:
Telerik UI for ASP.NET AJAX
No auth needed
Prerequisites:
none specified
nomisec
WORKING POC
by alanbarret · poc
https://github.com/alanbarret/CVE-2019-18935
This repository contains functional exploit code for CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. It includes scripts for version detection, exploitation, and a Docker environment for testing.
Classification
Working Poc 95%
Target:
Progress Telerik UI for ASP.NET AJAX (versions up to 2019.3.1023)
No auth needed
Prerequisites:
Telerik UI for ASP.NET AJAX version detection · Hardcoded encryption keys for CVE-2017-11317
nomisec
WORKING POC
by menashe12346 · remote
https://github.com/menashe12346/CVE-2019-18935
This repository contains a functional exploit for CVE-2019-18935, targeting Telerik Web UI for ASP.NET AJAX. The exploit leverages insecure deserialization and arbitrary file upload vulnerabilities to achieve remote code execution via a reverse shell.
Classification
Working Poc 95%
Target:
Telerik Web UI for ASP.NET AJAX (versions before R3 2019 SP1)
No auth needed
Prerequisites:
Access to the target URL with vulnerable Telerik Web UI · Ability to upload a malicious DLL to the target server
nomisec
WORKING POC
by quyt0 · remote
https://github.com/quyt0/CVE-2019-18935-exploit-study
This repository contains a functional exploit for CVE-2019-18935, a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. The exploit includes a Python script that uploads a malicious payload and triggers deserialization to achieve remote code execution.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX
No auth needed
Prerequisites:
Target must be running a vulnerable version of Telerik UI for ASP.NET AJAX · Network access to the target server
nomisec
WORKING POC
by clarkvoss · remote
https://github.com/clarkvoss/telerik
This repository contains a functional exploit for CVE-2019-18935, a deserialization vulnerability in Telerik UI for ASP.NET AJAX. The exploit leverages ysoserial to generate malicious payloads and attempts to achieve remote code execution on vulnerable systems.
Classification
Working Poc 95%
Target:
Telerik UI for ASP.NET AJAX
No auth needed
Prerequisites:
Wine installed for ysoserial execution · Access to ysoserial.exe · Network access to the target URL
nomisec
SCANNER
by 0xsharz · poc
https://github.com/0xsharz/telerik-scanner-CVE-2019-18935
This repository contains a Python-based scanner for detecting the Telerik UI for ASP.NET AJAX Remote Code Execution vulnerability (CVE-2019-18935). The scanner checks for the presence of vulnerable RadAsyncUpload handlers and analyzes version information to determine vulnerability status.
Classification
Scanner 100%
Attack Type
Deserialization
Target:
Telerik UI for ASP.NET AJAX through 2019.3.1023
No auth needed
Prerequisites:
Known encryption keys due to CVE-2017-11317 or CVE-2017-11357
nomisec
SCANNER
by 0xAgun · infoleak
https://github.com/0xAgun/CVE-2019-18935-checker
This repository contains a Python script that checks for the presence of the Telerik RadAsyncUpload vulnerability (CVE-2019-18935) by sending HTTP requests to a list of URLs and checking for a specific response pattern. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
Telerik UI for ASP.NET AJAX (RadAsyncUpload)
No auth needed
Prerequisites:
List of target URLs
nomisec
SCANNER
by becrevex · infoleak
https://github.com/becrevex/Telerik_CVE-2019-18935
The repository contains a Python script (`telerik_rce_scan.py`) designed to scan for CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. It checks for the presence of vulnerable endpoints and versions but does not include exploit code for remote code execution.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Telerik UI for ASP.NET AJAX (versions before 2020.1.114)
No auth needed
Prerequisites:
Network access to the target · Presence of vulnerable Telerik UI endpoints
nomisec
SCANNER
by appliedi · infoleak
https://github.com/appliedi/Telerik_CVE-2019-18935
This repository contains a Python script (`telerik_rce_scan.py`) designed to scan for the presence of CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. The script checks for vulnerable endpoints and versions but does not include exploit code for remote code execution.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Telerik UI for ASP.NET AJAX through 2019.3.1023
No auth needed
Prerequisites:
Presence of CVE-2017-11317 or CVE-2017-11357 to obtain encryption keys
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre, Paul Taylor, Markus Wulftange, Caleb Gross, Alvaro Muñoz, Oleksandr Mirosh, straightblast · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/telerik_rau_deserialization.rb
This Metasploit module exploits CVE-2019-18935, a .NET deserialization vulnerability in Telerik UI ASP.NET AJAX RadAsyncUpload. It uploads a malicious DLL via weak encryption (CVE-2017-11317) and triggers RCE through insecure deserialization.
Classification
Working Poc 100%
Target:
Telerik UI ASP.NET AJAX RadAsyncUpload
No auth needed
Prerequisites:
knowledge of RAU cryptographic keys · Telerik UI ASP.NET AJAX version
vulncheck_xdb
WORKING POC
remote
https://github.com/hnytgl/TelerikUI-RCE
This repository contains a functional exploit tool for CVE-2019-18935, targeting Progress Telerik UI's remote code execution vulnerability. The script includes detection, exploitation, and custom payload testing capabilities.
Classification
Working Poc 95%
Target:
Progress Telerik UI (versions 2007.2.607.0 - 2019.3.1023.0)
No auth needed
Prerequisites:
Telerik UI component presence · RadAsyncUpload component exposure