CVE-2024-6097

5.3 MEDIUM

📋 TL;DR

This vulnerability allows a local threat actor to disclose sensitive information through absolute path traversal in Progress Telerik Reporting. It affects versions prior to 2025 Q1 (19.0.25.211) and requires local access to exploit.

💻 Affected Systems

Products:
  • Progress Telerik Reporting
Versions: All versions prior to 2025 Q1 (19.0.25.211)
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system running Telerik Reporting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains access to sensitive file paths and potentially confidential system information that could aid further attacks.

🟠

Likely Case

Information disclosure revealing internal file system structure and configuration details.

🟢

If Mitigated

Limited impact with proper access controls and network segmentation in place.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers on the same system could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the vulnerable system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025 Q1 (19.0.25.211) or later

Vendor Advisory: https://docs.telerik.com/reporting/knowledge-base/kb-security-absolute-path-traversal-CVE-2024-6097

Restart Required: Yes

Instructions:

1. Download Telerik Reporting 2025 Q1 (19.0.25.211) or later. 2. Backup current configuration. 3. Install the updated version. 4. Restart affected services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to systems running Telerik Reporting to authorized personnel only.

Network Segmentation

all

Isolate Telerik Reporting systems from other critical systems to limit lateral movement.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to Telerik Reporting systems.
  • Monitor system logs for unusual local access patterns or information disclosure attempts.

🔍 How to Verify

Check if Vulnerable:

Check Telerik Reporting version. If version is below 19.0.25.211, the system is vulnerable.

Check Version:

Check Telerik Reporting version through the application interface or configuration files.

Verify Fix Applied:

Verify Telerik Reporting version is 19.0.25.211 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual local user access to Telerik Reporting services
  • Path traversal attempts in application logs

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

Search for local user access events to Telerik Reporting services from unauthorized accounts.

🔗 References

📤 Share & Export