First published: Fri Dec 13 2019(Updated: )
Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server through a specially crafted request. NOTE: RadChart was discontinued in 2014 in favor of RadHtmlChart. All RadChart versions were affected. To avoid this vulnerability, you must remove RadChart's HTTP handler from a web.config (its type is Telerik.Web.UI.ChartHttpHandler).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telerik Radchart | ||
Telerik UI for ASP.NET AJAX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19790 is a path traversal vulnerability in Telerik UI for ASP.NET AJAX that allows a remote attacker to read and delete certain image files on the server.
CVE-2019-19790 has a severity rating of 9.8, which is considered critical.
The vulnerability affects Telerik RadChart and Telerik UI for ASP.NET AJAX.
An attacker can exploit CVE-2019-19790 by sending a specially crafted request to the server, which allows them to read and delete specific image files.
Yes, Telerik discontinued RadChart in 2014 and recommended using RadHtmlChart instead, which is not vulnerable to CVE-2019-19790.