|
| 1 | +--- |
| 2 | +title: Command Injection Vulnerability |
| 3 | +description: "How to mitigate CVE-2024-7679, a command injection vulnerability when using hyperlinks." |
| 4 | +slug: command-injection-vulnerability-cve-2024-7679 |
| 5 | +res_type: kb |
| 6 | +--- |
| 7 | + |
| 8 | +## Description |
| 9 | + |
| 10 | +Product Alert – September 2024 - [CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679) |
| 11 | + |
| 12 | +- Telerik UI for WinForms 2024 Q3 (2024.3.806) or earlier. |
| 13 | + |
| 14 | +## Issue |
| 15 | + |
| 16 | +CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') |
| 17 | + |
| 18 | +### What Are the Impacts |
| 19 | + |
| 20 | +In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements. |
| 21 | + |
| 22 | +## Solution |
| 23 | + |
| 24 | +We have addressed the issue and the Progress Telerik team recommends performing an upgrade to the version listed in the table below. |
| 25 | + |
| 26 | +| Current Version | Guidance | |
| 27 | +|-----------------|----------| |
| 28 | +| 2024 Q3 (2024.3.806) or earlier | Update to 2024 Q3 (2024.3.924) ([update instructions](({%slug how-to-upgrade-a-project%}))) | |
| 29 | + |
| 30 | +All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWPF). |
| 31 | + |
| 32 | +## Notes |
| 33 | + |
| 34 | +- If a RichTextBox, PdfViewer, or Spreadsheet is not used in the project, the application is not affected by this issue. |
| 35 | +- To check your version of Telerik UI for WinForms |
| 36 | + - Via source code: Inspect the Version property of any of the Telerik.WinControls.* assembly references in the project. |
| 37 | + - Via deployed application: Locate any Telerik.WinControls.* DLL file in the application's directory and view the Properties > Details > Version. |
| 38 | +- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan. |
| 39 | + |
| 40 | +## External References |
| 41 | + |
| 42 | +[CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679) (HIGH) |
| 43 | + |
| 44 | +**CVSS:** 7.8 |
| 45 | + |
| 46 | +In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements. |
0 commit comments