Skip to content

Commit eadfd45

Browse files
authored
Merge pull request #648 from telerik/dkrastev/m-Add_KB-vulnerability
Dkrastev/m add kb vulnerability
2 parents 85eabc6 + b145744 commit eadfd45

File tree

2 files changed

+47
-1
lines changed

2 files changed

+47
-1
lines changed

controls/editors/timeonlypicker/properties-and-events.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ position: 4
3535
|__MinValue__|Get or set the minimal time value assigned to the control.|
3636
|__RowHeight__|Gets or sets the height of the rows in the hour/minutes tables in the drop down.|
3737
|__Culture__|Determines the language of the drop down and the editable area. From here you can control if the format is 12 ("en-US") or 24 hours ("en-UK").|
38-
|__CloseButtonText__|Gets or sets the text of the button in the drop down|
3938
|__TimeOnlyPickerElement__|Gives access the RadTimeOnlyPickerElement.|
4039

4140
## Events
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Unsafe Deserialization Vulnerability (10013)
3+
description: "How to mitigate CVE-2024-10013, an unsafe deserialization vulnerability."
4+
slug: unsafe-deserialization-vulnerability-cve-2024-10013
5+
tags: common, vulnerability
6+
res_type: kb
7+
---
8+
9+
## Description
10+
11+
Product Alert – November 2024 - [CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013)
12+
13+
- Telerik UI for WinForms 2024 Q3 (2024.3.924) or earlier.
14+
15+
## Issue
16+
17+
CWE-502: Deserialization of Untrusted Data
18+
19+
### What Are the Impacts
20+
21+
In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability when loading external document styles for RichTextBox.
22+
23+
## Solution
24+
25+
We have addressed the issue and the Progress Telerik team strongly recommends performing an upgrade to the latest version listed in the table below.
26+
27+
| Current Version | Guidance |
28+
|-----------------|----------|
29+
| 2024 Q3 (2024.3.924) or earlier | Update to 2024 Q4 (2024.4.1113) ([update instructions](({%slug how-to-upgrade-a-project%}))) |
30+
31+
All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWF).
32+
33+
## Notes
34+
35+
- If a project is not using the RichTextBox, the application is not affected by this vulnerability.
36+
- To check your version of Telerik UI for WinForms
37+
- Via source code: Inspect the Version property of any of the `Telerik.WinControls.*` assembly references in the project.
38+
- Via deployed application: Locate any `Telerik.WinControls.*.dll` file in the application's directory, right-click, select Properties and view the Version in the Details tab.
39+
- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan.
40+
41+
## External References
42+
43+
[CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013) (HIGH)
44+
45+
**CVSS:** 7.8
46+
47+
In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability.

0 commit comments

Comments
 (0)