More than DoS Progress Telerik UI for ASP.NET AJAX Unsafe Re... #1504
      
        
          +223
        
        
          −0
        
        
          
        
      
    
  
  Add this suggestion to a batch that can be applied as a single commit.
  This suggestion is invalid because no changes were made to the code.
  Suggestions cannot be applied while the pull request is closed.
  Suggestions cannot be applied while viewing a subset of changes.
  Only one suggestion per line can be applied in a batch.
  Add this suggestion to a batch that can be applied as a single commit.
  Applying suggestions on deleted lines is not supported.
  You must change the existing code in this line in order to create a valid suggestion.
  Outdated suggestions cannot be applied.
  This suggestion has been applied or marked resolved.
  Suggestions cannot be applied from pending reviews.
  Suggestions cannot be applied on multi-line comments.
  Suggestions cannot be applied while the pull request is queued to merge.
  Suggestion cannot be applied right now. Please check back later.
  
    
  
    
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What: CVE-2025-3600 is an Unsafe Reflection bug (CWE-470) in Progress Telerik UI for ASP.NET AJAX that allows pre-auth instantiation of arbitrary public parameterless .NET types. It was initially labeled DoS, but in many real apps it can be escalated to RCE by abusing target-specific gadgets (e.g., insecure AppDomain assembly resolvers).
Where/Surface: The unauthenticated handler
Telerik.Web.UI.WebResource.axdwithtype=iec(Image Editor cache han...🔧 Technical Details
Unsafe Reflection via parameterless ctor: Abuse
Telerik.Web.UI.WebResource.axd?type=iecwithdkey=1(blog examples sometimes showdtype=1) and attacker-controlledprtypesoType.GetType()+Activator.CreateInstance()construct any public no‑arg type before type checks. Example:/Telerik.Web.UI.WebResource.axd?type=iec&dkey=1&prtype=Your.Type, Your.Assembly.🎁 DoS via PowerShell WSMan finalizer: Instantiate
System.Management.Automation.Remoting.WSManPluginManagedEntryInstanceWrapper; the GC finalizer frees an uninitialized handle and crashes the app. PoC:...&prtype=System.Management.Automation.Remoting.WSManPluginManagedEntryInstanceWrapper,+System.Management.Automation,+Version%3d3.0.0.0,+Culture%3dneutral,+PublicKeyToken%3d31bf3856ad364e35.Constructor chains that read attacker input: Target parameterless ctors whose init...
🤖 Agent Actions
I analyzed the blog and the current HackTricks repository, searched for any pre-existing Telerik UI or ASP.NET unsafe reflection/AssemblyResolve abuse content, and did not find any relevant page. I read more than five related files (IIS, DNN, SharePoint, ViewState, SSTI, XSLT) to understand structure and decide the best location.
What I added/changed:
Tool actions performed:
No conflicting existing content was found. All changes follow HackTricks style (headings, code blocks, expandable sections, references at end, training banner at top/bottom, internal refs).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.