Lucene search

K
zdiSina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)ZDI-24-561
HistoryMay 31, 2024 - 12:00 a.m.

Progress Software Telerik Reporting Register Authentication Bypass Vulnerability

2024-05-3100:00:00
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
www.zerodayinitiative.com
4
vulnerability
remote attackers
authentication bypass
progress software
telerik reporting
register method
installation step
system

7 High

AI Score

Confidence

High

0.938 High

EPSS

Percentile

99.2%

This vulnerability allows remote attackers to bypass authentication on affected installations of Progress Software Telerik Reporting. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Register method. The issue results from the lack of validating the current installation step. An attacker can leverage this vulnerability to bypass authentication on the system.