Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error messages from a patched target #17

Open
noperator opened this issue Jul 27, 2021 · 0 comments
Open

Error messages from a patched target #17

noperator opened this issue Jul 27, 2021 · 0 comments

Comments

@noperator
Copy link

For your awareness, I think you may receive these error messages from a target that's been patched for CVE-2017-9248. When dp is less than 44 characters long, you'll get the first error (note the line break before Parameter name); when it's 44 characters or longer, you'll get the second.

$ curl -sk "$TARGET/Telerik.Web.UI.DialogHandler.aspx?dp="$(python3 -c 'print("A" * 43)')

<div>Error Message:Length cannot be less than zero.
Parameter name: length</div>

$ curl -sk "$TARGET/Telerik.Web.UI.DialogHandler.aspx?dp="$(python3 -c 'print("A" * 44)')

<div>Error Message:The hash is not valid!</div>

I've found recent forum posts here and here where users have patched their Telerik assemblies and are seeing The hash is not valid! when attempting to exploit this vulnerability after the patch. Just documenting this here in hopes that it'll help others who run into these messages in the future.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant