CVE-2024-4358
CRITICAL KEV NUCLEITelerik Report Server Auth Bypass and Deserialization RCE
Title source: metasploitDescription
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
Exploits (8)
nomisec
WORKING POC
26 stars
by Sk1dr0wz · remote
https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit
nomisec
WORKING POC
5 stars
by RevoltSecurities · remote
https://github.com/RevoltSecurities/CVE-2024-4358
exploitdb
WORKING POC
by VeryLazyTech · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52103
metasploit
WORKING POC
by SinSinology, Spencer McIntyre · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/telerik_report_server_auth_bypass.rb
Nuclei Templates (1)
Progress Telerik Report Server - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
title:"Log in | Telerik Report Server"
Scores
CVSS v3
9.8
EPSS
0.9434
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2024-06-13
VulnCheck KEV
2024-06-07
InTheWild.io
2024-06-13
ENISA EUVD
EUVD-2024-43994
Classification
CWE
CWE-290
Status
published
Affected Products (1)
telerik/report_server_2024
< 10.0.24.305
Timeline
Published
May 29, 2024
KEV Added
Jun 13, 2024
Tracked Since
Feb 18, 2026