In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation.
The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Telerik_reporting | Progress | * | 18.2.24.924 (excluding) |