Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:telerik:ui_for_silverlight:*:*:*:*:*:*:*:*", "matchCriteriaId": "A08D476E-5D13-4E6A-95C9-E03C3250E023", "versionEndExcluding": "2020.1.330", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Progress Telerik UI for Silverlight before 2020.1.330. The RadUploadHandler class in RadUpload for Silverlight expects a web request that provides the file location of the uploading file along with a few other parameters. The uploading file location should be inside the directory where the upload handler class is defined. Before 2020.1.330, a crafted web request could result in uploads to arbitrary locations."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Progress Telerik UI for Silverlight versiones anteriores a 2020.1.330. La clase RadUploadHandler en RadUpload para Silverlight espera una petici\u00f3n web que provea la ubicaci\u00f3n de archivo del archivo de carga junto con algunos otros par\u00e1metros. La ubicaci\u00f3n del archivo de carga debe estar dentro del directorio donde es definida la clase del manejador de carga. Antes de la versi\u00f3n 2020.1.330, una petici\u00f3n web dise\u00f1ada podr\u00eda resultar en cargas en ubicaciones arbitrarias."}], "id": "CVE-2020-11414", "lastModified": "2024-11-21T04:57:53.920", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-03-31T13:15:13.177", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://docs.telerik.com/devtools/silverlight/controls/radupload/how-to/secure-upload-file-path"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://docs.telerik.com/devtools/silverlight/controls/radupload/how-to/secure-upload-file-path"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}