Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value.
References
Configurations
History
30 Jun 2025, 13:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:progress:telerik_ui_for_asp.net_ajax:*:*:*:*:*:*:*:* | |
First Time |
Progress telerik Ui For Asp.net Ajax
Progress |
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://itq.nl/arbitrary-file-write-in-telerik-ui-for-asp-net-ajax/ - Exploit |
Information
Published : 2014-12-25 21:59
Updated : 2025-06-30 13:06
NVD link : CVE-2014-2217
Mitre link : CVE-2014-2217
CVE.ORG link : CVE-2014-2217
JSON object : View
Products Affected
progress
- telerik_ui_for_asp.net_ajax
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')