CVE-2024-4358

CRITICAL KEV NUCLEI

Telerik Report Server Auth Bypass and Deserialization RCE

Title source: metasploit

Description

In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.

Exploits (8)

nomisec WORKING POC 78 stars
by sinsinology · remote
https://github.com/sinsinology/CVE-2024-4358
nomisec WORKING POC 26 stars
by Sk1dr0wz · remote
https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit
nomisec WORKING POC 12 stars
by verylazytech · remote
https://github.com/verylazytech/CVE-2024-4358
nomisec WORKING POC 5 stars
by RevoltSecurities · remote
https://github.com/RevoltSecurities/CVE-2024-4358
nomisec WORKING POC 4 stars
by gh-ost00 · remote
https://github.com/gh-ost00/CVE-2024-4358
nomisec WORKING POC
by Harydhk7 · remote
https://github.com/Harydhk7/CVE-2024-4358
exploitdb WORKING POC
by VeryLazyTech · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52103
metasploit WORKING POC
by SinSinology, Spencer McIntyre · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/telerik_report_server_auth_bypass.rb

Nuclei Templates (1)

Progress Telerik Report Server - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan: title:"Log in | Telerik Report Server"

Scores

CVSS v3 9.8
EPSS 0.9434
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2024-06-13
VulnCheck KEV 2024-06-07
InTheWild.io 2024-06-13
ENISA EUVD EUVD-2024-43994

Classification

CWE
CWE-290
Status published

Affected Products (1)

telerik/report_server_2024 < 10.0.24.305

Timeline

Published May 29, 2024
KEV Added Jun 13, 2024
Tracked Since Feb 18, 2026