Skip to content

Commit

Permalink
Merge pull request #648 from telerik/dkrastev/m-Add_KB-vulnerability
Browse files Browse the repository at this point in the history
Dkrastev/m add kb vulnerability
  • Loading branch information
nade7o authored Nov 13, 2024
2 parents 85eabc6 + b145744 commit eadfd45
Show file tree
Hide file tree
Showing 2 changed files with 47 additions and 1 deletion.
1 change: 0 additions & 1 deletion controls/editors/timeonlypicker/properties-and-events.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,6 @@ position: 4
|__MinValue__|Get or set the minimal time value assigned to the control.|
|__RowHeight__|Gets or sets the height of the rows in the hour/minutes tables in the drop down.|
|__Culture__|Determines the language of the drop down and the editable area. From here you can control if the format is 12 ("en-US") or 24 hours ("en-UK").|
|__CloseButtonText__|Gets or sets the text of the button in the drop down|
|__TimeOnlyPickerElement__|Gives access the RadTimeOnlyPickerElement.|

## Events
Expand Down
47 changes: 47 additions & 0 deletions knowledge-base/unsafe-deserialization-cve-2024-10013.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
---
title: Unsafe Deserialization Vulnerability (10013)
description: "How to mitigate CVE-2024-10013, an unsafe deserialization vulnerability."
slug: unsafe-deserialization-vulnerability-cve-2024-10013
tags: common, vulnerability
res_type: kb
---

## Description

Product Alert – November 2024 - [CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013)

- Telerik UI for WinForms 2024 Q3 (2024.3.924) or earlier.

## Issue

CWE-502: Deserialization of Untrusted Data

### What Are the Impacts

In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability when loading external document styles for RichTextBox.

## Solution

We have addressed the issue and the Progress Telerik team strongly recommends performing an upgrade to the latest version listed in the table below.

| Current Version | Guidance |
|-----------------|----------|
| 2024 Q3 (2024.3.924) or earlier | Update to 2024 Q4 (2024.4.1113) ([update instructions](({%slug how-to-upgrade-a-project%}))) |

All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWF).

## Notes

- If a project is not using the RichTextBox, the application is not affected by this vulnerability.
- To check your version of Telerik UI for WinForms
- Via source code: Inspect the Version property of any of the `Telerik.WinControls.*` assembly references in the project.
- Via deployed application: Locate any `Telerik.WinControls.*.dll` file in the application's directory, right-click, select Properties and view the Version in the Details tab.
- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan.

## External References

[CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013) (HIGH)

**CVSS:** 7.8

In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability.

0 comments on commit eadfd45

Please sign in to comment.