CVE-2017-11317

9.8 CRITICAL

📋 TL;DR

This vulnerability in Telerik UI for ASP.NET AJAX allows remote attackers to bypass file upload restrictions due to weak encryption in the RadAsyncUpload component. Attackers can upload arbitrary files, potentially leading to remote code execution. Affects systems using vulnerable versions of Telerik UI for ASP.NET AJAX.

💻 Affected Systems

Products:
  • Progress Telerik UI for ASP.NET AJAX
Versions: All versions before R1 2017 and R2 before R2 2017 SP2
Operating Systems: Windows (ASP.NET applications)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web applications using the RadAsyncUpload component. The vulnerability is in the encryption mechanism used for file uploads.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Arbitrary file upload allowing attackers to deploy web shells, deface websites, or establish persistence.

🟢

If Mitigated

Limited impact if proper input validation and file upload restrictions are enforced at application level.

🌐 Internet-Facing: HIGH - Directly exploitable over HTTP/HTTPS without authentication.
🏢 Internal Only: MEDIUM - Still exploitable internally but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploits available. Exploitation requires knowledge of the encryption key, which can be brute-forced or obtained from other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R1 2017 or later, R2 2017 SP2 or later

Vendor Advisory: http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/unrestricted-file-upload

Restart Required: Yes

Instructions:

1. Update Telerik UI for ASP.NET AJAX to R1 2017 or later, or R2 2017 SP2 or later. 2. Recompile and redeploy affected applications. 3. Restart IIS/application pools.

🔧 Temporary Workarounds

Disable RadAsyncUpload

all

Remove or disable the RadAsyncUpload component from affected applications

Remove Telerik:RadAsyncUpload controls from ASP.NET pages

Implement custom file upload validation

all

Add server-side validation to restrict file types and scan uploaded files

Implement HttpModule or custom handler to validate file uploads before processing

🧯 If You Can't Patch

  • Implement WAF rules to block requests containing RadAsyncUpload-specific parameters
  • Restrict network access to affected applications using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check Telerik.Web.UI.dll version in application bin folder. Versions before 2017.1.118 are vulnerable.

Check Version:

powershell: (Get-Item "path\to\Telerik.Web.UI.dll").VersionInfo.FileVersion

Verify Fix Applied:

Verify Telerik.Web.UI.dll version is 2017.1.118 or later, or R2 2017.2.621 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to RadAsyncUpload handlers
  • Requests to /Telerik.Web.UI.WebResource.axd with encrypted parameters
  • Web shell deployment in upload directories

Network Indicators:

  • HTTP POST requests to RadAsyncUpload handlers with encrypted data
  • Unusual outbound connections from web servers after file uploads

SIEM Query:

source="iis" AND (url="*RadAsyncUpload*" OR url="*WebResource.axd*") AND (method="POST" OR status=200)

🔗 References

📤 Share & Export