All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html | |
https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2021-12-03T00:00:00
Updated: 2023-11-14T03:06:35.776036
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23758
JSON object: View
NVD Information
Status : Modified
Published: 2021-12-03T20:15:07.557
Modified: 2023-11-14T03:15:07.973
Link: CVE-2021-23758
JSON object: View
Redhat Information
No data.
CWE