CVE-2021-28141

CVSS V2 High 7.5 CVSS V3 Critical 9.8
Description
** DISPUTED ** An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI. NOTE: the vendor states that this is not a vulnerability. The request's output does not indicate that a "true" command was executed on the server, and the request's output does not leak any private source code or data from the server.
Overview
  • CVE ID
  • CVE-2021-28141
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-03-11T17:15:13
  • Last Modified Date
  • 2021-03-18T01:44:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:telerik:ui_for_asp.net_ajax:2021.1.224:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://pastebin.com/JULpfvFJ Exploit Third Party Advisory
https://gist.github.com/shreyasfegade/e2480e26b2ed1d0c7175ecf7cb15f9c1 Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:19:32 Added to TrackCVE
2022-12-05 23:38:47 2021-03-11T17:15Z 2021-03-11T17:15:13 CVE Published Date updated
2022-12-05 23:38:47 2021-03-18T01:44:11 CVE Modified Date updated
2022-12-05 23:38:47 Analyzed Vulnerability Status updated