First published: Tue Aug 11 2020(Updated: )
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telegram Telegram Desktop | <=2.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Telegram Desktop vulnerability is CVE-2020-17448.
The severity of CVE-2020-17448 is high (7.8).
The affected software for CVE-2020-17448 is Telegram Desktop through version 2.1.13.
The vulnerability in Telegram Desktop allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism by using a chat window with a filename that lacks an extension.
To fix the CVE-2020-17448 vulnerability, update Telegram Desktop to version 2.2.0 or later.