9.8 CVE-2019-18935

Enriched by CISA CISA Kev Catalog Patch Exploit
 

Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
https://nvd.nist.gov/vuln/detail/CVE-2019-18935

Categories

CWE-502 : Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. Marshaling and unmarshaling are effectively synonyms for serialization and deserialization, respectively. In Python, the "pickle" functionality is used to perform serialization and deserialization. Some PHP application researchers use this term when attacking unsafe use of the unserialize() function; but it is also used for CWE-915. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) If available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified. When deserializing data, populate a new object rather than just deserializing. The result is that the data flows through safe input validation and that the functions are safe. Explicitly define a final object() to prevent deserialization. Avoid having unnecessary types or gadgets (a sequence of instances and method invocations that can self-execute during the deserialization process, often found in libraries) available that can be leveraged for malicious ends. This limits the potential for unintended or unauthorized types and gadgets to be leveraged by the attacker. Add only acceptable classes to an allowlist. Note: new gadgets are constantly being discovered, so this alone is not a sufficient mitigation. Employ cryptography of the data or code for protection. However, it's important to note that it would still be client-side security. This is risky because if the client is compromised then the security implemented on the client (the cryptography) can be bypassed. Use an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481]. insecure deserialization in platform for managing AI/ML applications and models allows code execution via a crafted pickled object in a model file deserialization of untrusted YAML data in dashboard for data query and visualization of Elasticsearch data PHP object injection in WordPress plugin for AI-based SEO chain: bypass of untrusted deserialization issue (CWE-502) by using an assumed-trusted class (CWE-183) Deserialization issue in commonly-used Java library allows remote execution. Deserialization issue in commonly-used Java library allows remote execution. Use of PHP unserialize function on untrusted input allows attacker to modify application configuration. Use of PHP unserialize function on untrusted input in content management system might allow code execution. Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value. Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution. Python script allows local users to execute code via pickled data. Unsafe deserialization using pickle in a Python script. Web browser allows execution of native methods via a crafted string to a JavaScript function that deserializes the string.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0

af854a3a-2127-422b-91ae-364da2661108 Patch Exploit

http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution....
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncU...
Exploit Third Party Advisory VDB Entry
https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html
Not Applicable
https://github.com/bao7uo/RAU_crypto
Exploit Third Party Advisory
https://github.com/noperator/CVE-2019-18935
Exploit Third Party Advisory
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-t...
Exploit Third Party Advisory
https://www.bleepingcomputer.com/news/security/us-federal-agency-hacked-using...
Press/Media Coverage
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptseria...
Patch Vendor Advisory
https://www.telerik.com/support/whats-new/aspnet-ajax/release-history/ui-for-...
Release Notes
https://www.telerik.com/support/whats-new/release-history
Release Notes Vendor Advisory

cve@mitre.org Patch Exploit

http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution....
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncU...
Exploit Third Party Advisory VDB Entry
https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html
Not Applicable
https://github.com/bao7uo/RAU_crypto
Exploit Third Party Advisory
https://github.com/noperator/CVE-2019-18935
Exploit Third Party Advisory
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-t...
Exploit Third Party Advisory
https://www.bleepingcomputer.com/news/security/us-federal-agency-hacked-using...
Press/Media Coverage
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptseria...
Patch Vendor Advisory
https://www.telerik.com/support/whats-new/aspnet-ajax/release-history/ui-for-...
Release Notes
https://www.telerik.com/support/whats-new/release-history
Release Notes Vendor Advisory


 

AFFECTED (from MITRE)


Vendor Product Versions
n/a n/a
  • n/a [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:* >= 2011.1.315 <= 2020.1.114


REMEDIATION


Patch

Url
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptseria...
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptseria...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/noperator/CVE-2019-18935

Other Nist (github, ...)

Url
http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncU...
https://github.com/bao7uo/RAU_crypto
https://github.com/noperator/CVE-2019-18935
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-t...
http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncU...
https://github.com/bao7uo/RAU_crypto
https://github.com/noperator/CVE-2019-18935
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-t...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
586 Object Injection
High