Skip to content

Commit 0a9228a

Browse files
authored
Merge pull request #630 from telerik/dkrastev/kb-command-injection-cve
Dkrastev/kb command injection CVE
2 parents 4c2dfd6 + 77015a3 commit 0a9228a

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Command Injection Vulnerability
3+
description: "How to mitigate CVE-2024-7679, a command injection vulnerability when using hyperlinks."
4+
slug: command-injection-vulnerability-cve-2024-7679
5+
res_type: kb
6+
---
7+
8+
## Description
9+
10+
Product Alert – September 2024 - [CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679)
11+
12+
- Telerik UI for WinForms 2024 Q3 (2024.3.806) or earlier.
13+
14+
## Issue
15+
16+
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
17+
18+
### What Are the Impacts
19+
20+
In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.
21+
22+
## Solution
23+
24+
We have addressed the issue and the Progress Telerik team recommends performing an upgrade to the version listed in the table below.
25+
26+
| Current Version | Guidance |
27+
|-----------------|----------|
28+
| 2024 Q3 (2024.3.806) or earlier | Update to 2024 Q3 (2024.3.924) ([update instructions](({%slug how-to-upgrade-a-project%}))) |
29+
30+
All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWPF).
31+
32+
## Notes
33+
34+
- If a RichTextBox, PdfViewer, or Spreadsheet is not used in the project, the application is not affected by this issue.
35+
- To check your version of Telerik UI for WinForms
36+
- Via source code: Inspect the Version property of any of the Telerik.WinControls.* assembly references in the project.
37+
- Via deployed application: Locate any Telerik.WinControls.* DLL file in the application's directory and view the Properties > Details > Version.
38+
- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan.
39+
40+
## External References
41+
42+
[CVE-2024-7679](https://www.cve.org/CVERecord?id=CVE-2024-7679) (HIGH)
43+
44+
**CVSS:** 7.8
45+
46+
In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.

0 commit comments

Comments
 (0)