fortiguard.fortinet.com
Open in
urlscan Pro
154.52.13.197
Public Scan
Submitted URL: http://www.fortinet.com/ids/VID48789
Effective URL: https://fortiguard.fortinet.com/encyclopedia/ips/48789
Submission: On March 28 via api from OM — Scanned from DE
Effective URL: https://fortiguard.fortinet.com/encyclopedia/ips/48789
Submission: On March 28 via api from OM — Scanned from DE
Form analysis
2 forms found in the DOMGET /search
<form action="/search" method="get" class="form-check d-none ng-pristine ng-valid">
<span class="search_flat">
<label for="search_field_header" class="visually-hidden" id="label-search_field-header">Search</label>
<input id="search_field_header" type="text" class="search_field" placeholder="Search FortiGuard" name="q" required="required" autocomplete="off" aria-labelledby="label-search_field-header" value="">
<button type="submit" value=" " class="btn btn-sm" aria-label="Submit your search">
<img src="https://filestore.fortinet.com/fortiguard/static/images/icons_white/search.svg?v=25661" alt="search">
</button>
<div class="global_search-popup">
<fieldset>
<legend class="visually-hidden">Please select any available option</legend>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="all_home" class="form-check-input search-input-option" value="1" checked="checked" aria-checked="true">
<label class="form-check-label search-input-label" for="all_home"> Normal </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="exact_home" class="form-check-input search-input-option" value="2">
<label class="form-check-label search-input-label" for="exact_home"> Exact Match </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="cve_home" class="form-check-input search-input-option" value="3">
<label class="form-check-label search-input-label" for="cve_home"> CVE Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="threat_home" class="form-check-input search-input-option" value="4">
<label class="form-check-label search-input-label" for="threat_home"> ID Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="vid_home" class="form-check-input search-input-option" value="5">
<label class="form-check-label search-input-label" for="vid_home"> Zero-Day Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="psirt_home" class="form-check-input search-input-option" value="6">
<label class="form-check-label search-input-label" for="psirt_home"> PSIRT Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="repms_home" class="form-check-input search-input-option" value="8">
<label class="form-check-label search-input-label" for="repms_home"> Antispam Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="outbreak-alert_home" class="form-check-input search-input-option" value="9">
<label class="form-check-label search-input-label" for="outbreak-alert_home"> Outbreak Alert Lookup </label>
</div>
<div class="form-check search-popup-item">
<input type="radio" name="engine" id="url_home" class="form-check-input search-input-option" value="7">
<label class="form-check-label search-input-label" for="url_home"> IP/Domain/URL Lookup </label>
</div>
</fieldset>
</div>
</span>
</form>
GET /search
<form action="/search" method="get" class="mobile-search-form col-12 ng-pristine ng-valid">
<div class="input-group">
<select class="form-select" name="engine">
<option value="1"> Normal </option>
<option value="2"> Exact Match </option>
<option value="3"> CVE Lookup </option>
<option value="4"> ID Lookup </option>
<option value="5"> Zero-Day Lookup </option>
<option value="6"> PSIRT Lookup </option>
<option value="8"> Antispam Lookup </option>
<option value="9"> Outbreak Alert Lookup </option>
<option value="7"> IP/Domain/URL Lookup </option>
</select>
<input id="search_field_header" type="text" class="form-control" placeholder="Search FortiGuard" name="q" required="required" autocomplete="off" aria-labelledby="label-search_field-header" value="">
<button class="btn btn-sm btn-outline-secondary" type="submit">
<img src="https://filestore.fortinet.com/fortiguard/static/images/icons_white/search.svg?v=25661" alt="search">
</button>
</div>
</form>
Text Content
* Search Please select any available option Normal Exact Match CVE Lookup ID Lookup Zero-Day Lookup PSIRT Lookup Antispam Lookup Outbreak Alert Lookup IP/Domain/URL Lookup * News / Research NEWS/RESEARCH RESEARCH CENTER PSIRT CENTER Explore latest research and threat reports on emerging cyber threats. * Outbreak Alerts * Threat Signal * Security Blog * Zero Day Fortinet Product Security Incident Response Team (PSIRT) updates. * Advisories * Security Vulnerability Policy * PSIRT Blog * PSIRT Contact * Services SERVICES BY OUTBREAK BY SOLUTION BY PRODUCT PROTECT Counter measures across the security fabric for protecting assets, data and network. * Anti-Recon and Anti-Exploit * AntiSpam * AntiVirus * Application Control * Anti-Botnet * Endpoint Detection & Response * Endpoint Vulnerability * Operational Technology Security * Intrusion Protection * Sandbox Behavior Engine * Web Application Security * Web Filtering DETECT Find and correlate important information to identify an outbreak.Find and correlate * Anti-Recon and Anti-Exploit * Indicators of Compromise * IoT Detection * Outbreak Deception * Outbreak Detection * Security Automation RESPOND Develop containment techniques to mitigate impacts of security events.Develop containment * FortiClient Forensics * FortiRecon: ACI * FortiXDR * Incident Response RECOVER Improve security posture and processes by implementing security awareness and training. * Assessment Services * NSE Training * Security Awareness Training IDENTIFY Identify processes and assets that need protection.Identify processes and assets that * CNP * Endpoint Vulnerability * FortiRecon: BP * FortiRecon: EASM * FortiTester * IoT Detection * Pen Testing * Security Rating * NETWORK SECURITY * Anti-Recon and Anti-Exploit * Anti-Botnet * CNP * Data Loss Prevention * Indicators of Compromise * Internet Services * Intrusion Protection * IP Geolocation * Secure DNS * ENDPOINT SECURITY * ANN and NDR * AntiVirus * Endpoint Detection & Response * Endpoint Vulnerability * IoT Detection * Sandbox Behavior Engine * FortiClient Outbreak Detection * APPLICATION SECURITY * AntiSpam * Application Control * Credential Stuffing Defense * Client Application Firewall * Operational Technology Security * Web Application Security * Web Filtering * SECURITY OPERATIONS * Breach Attack Simulation * FortiDevSec * FortiSIEM Outbreak Detection Service * Outbreak Detection * Outbreak Deception * Pen Testing * Security Rating * FortiGate * FortiAnalyzer * FortiClient * FortiWeb * FortiADC * FortiAuthenticator * FortiCNP * FortiDDoS * FortiDeceptor * FortiEDR * empty * FortiMail * FortiNDR * FortiPAM * FortiPolicy * FortiProxy * FortiRecon * FortiSandBox * FortiSASE * FortiSIEM * FortiTester * empty * AntiVirus * Application Control * Anti-Botnet * Operational Technology Security * Intrusion Protection * IoT Detection * IP Geolocation * Secure DNS * Security Rating * Web Filtering * Indicators of Compromise * Outbreak Detection * Security Automation * Anti-Recon and Anti-Exploit * AntiVirus * Application Firewall * Anti-Botnet * Credential Stuffing Defense * Endpoint Vulnerability * Intrusion Protection * Web Filtering * Outbreak Detection * AntiVirus * Application Control * Anti-Botnet * Credential Stuffing Defense * IP Geolocation * Web Application Security * Fuzzy Webshell * AntiVirus * Anti-Botnet * Credential Stuffing Defense * Intrusion Protection * IP Geolocation * Web Application Security * Web Filtering * IP Geolocation * Anti-Botnet * Data Loss Prevention * IP Geolocation * Vulnerability * Anti-Botnet * Anti-Recon and Anti-Exploit * AntiVirus * Intrusion Protection * Outbreak Deception * AntiVirus * EndPoint Detection and Response * Endpoint Vulnerability * Indicators of Compromise * Web Filtering * AntiSpam * AntiVirus * Web Filtering * Network Detection and Response * AntiVirus * Data Loss Prevention * Anti-Botnet * Application Control * Anti-Botnet * Application Control * Industrial Security * Digital Risk Protection * AntiVirus * Intrusion Protection * Sandbox Behavior Engine * Web Filtering * AntiVirus * Application Control * Anti-Botnet * Data Loss Prevention * Endpoint Vulnerability * Intrusion Protection * Secure DNS * Web Filtering * Indicators of Compromise * IP Geolocation * Outbreak Detection * Breach Attack Simulation * Threat Intelligence THREAT INTELLIGENCE CENTER Browse the FortiGuard Labs extensive encyclopedia and Threat Analytics. * Threat Encyclopedia * Threat Analytics * Threat Map * Application Control Lookup * Web Filtering Lookup * Resources RESOURCE CENTER Learn about service status, publications and other available resources. * MITRE ATT&CK Matrix * Publications * Security Best Practices * FortiGuard Sample Files * About ABOUT FORTIGUARD LABS PARTNERS AI-Powered Threat Intelligence for an Evolving Digital World. * Premium Services * Contact Us * RSS Feeds Leveraging cyber security industry partner relationships. * Cyber Threat Alliance * MITRE Engenuity * * News / Research * Outbreak Alerts * Threat Signal * Security Blog * Zero Day * Advisories * Security Vulnerability Policy * PSIRT Blog * PSIRT Contact * Services * Anti-Botnet * Anti-Recon and Anti-Exploit * Anti-Recon and Anti-Exploit * AntiSpam * AntiVirus * Application Control * Assessment Services * CNP * Endpoint Detection & Response * Endpoint Vulnerability * Endpoint Vulnerability * FortiClient Forensics * FortiRecon: ACI * FortiRecon: BP * FortiRecon: EASM * FortiTester * FortiXDR * Incident Response * Indicators of Compromise * Intrusion Protection * IoT Detection * IoT Detection * NSE Training * Operational Technology Security * Outbreak Deception * Outbreak Detection * Pen Testing * Sandbox Behavior Engine * Security Automation * Security Awareness Training * Security Rating * Web Application Security * Web Filtering * Threat Lookup * Threat Encyclopedia * Threat Analytics * Threat Map * Application Control Lookup * Web Filtering Lookup * Resources * MITRE ATT&CK Matrix * Publications * Security Best Practices * FortiGuard Sample Files * About * Premium Services * Contact Us * RSS Feeds * Cyber Threat Alliance * MITRE Engenuity * FORTINET Normal Exact Match CVE Lookup ID Lookup Zero-Day Lookup PSIRT Lookup Antispam Lookup Outbreak Alert Lookup IP/Domain/URL Lookup INTRUSION PREVENTION TELERIK.WEB.UI.RADASYNCUPLOAD.HANDLING.ARBITRARY.FILE.UPLOAD DESCRIPTION This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in Telerik UI for ASP.NET AJAX components. The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted SMTP request. An unauthenticated remote attacker may be able to exploit this to upload an arbitrary file, leading to a possible code execution condition. OUTBREAK ALERT Versions prior to R1 2020 (2020.1.114) are susceptible to remote code execution attacks on affected web servers of Telerik User Interface (UI) for ASP-NET due to a deserialization vulnerability found in RadAsyncUpload function. FortiGuard Labs continue seeing high exploitation activity of these old vulnerabilities. View the full Outbreak Alert Report AFFECTED PRODUCTS Telerik UI for ASP.NET AJAX between Q1 2011 (2011.1.315) and R3 2016 SP2 (2016.3.1027) Telerik UI for ASP.NET AJAX between R1 2017 (2017.1.118) and R2 2017 SP1 (2017.2.621) Telerik UI for ASP.NET AJAX between R2 2017 SP2 (2017.2.711) and R3 2019 (2019.3.917) Telerik UI for ASP.NET AJAX R3 2019 SP1 (2019.3.1023) and later IMPACT System Compromise: Remote attackers can execute arbitrary code on vulnerable systems. RECOMMENDED ACTIONS Apply the most recent upgrade or patch from the vendor. https://www.telerik.com/support/kb/aspnet-ajax/upload-(async)/details/unrestricted-file-upload TELEMETRY COVERAGE IPS (Regular DB) IPS (Extended DB) VERSION UPDATES Date Version Detail 2020-05-06 15.838 Default_action:pass:drop 2020-05-06 15.837 Default_action:drop:pass 2020-05-06 15.836 Default_action:pass:drop 2020-04-20 15.822 Sig Added 2020-04-16 15.819 ID 48789 Created Apr 16, 2020 Updated May 05, 2020 Outbreak Alert Progress Telerik UI Attack Risk CVE ID CVE-2017-11357 CVE-2019-18935 CVE-2017-11317 EPSS 94.8% Default Action drop Active Affected OS Other Affected App Other * Contact Us * Legal * Privacy * Partners * Feedback * * * * * Copyright © 2024 Fortinet, Inc. All Rights Reserved. This site uses cookies. Some are essential to the operation of the site; others help us improve the user experience. By continuing to use the site, you consent to the use of these cookies. To learn more about cookies, please read our privacy policy. Accept