Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
https://www.telerik.com/support/whats-new/release-history
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization
https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html
https://github.com/bao7uo/RAU_crypto
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
https://github.com/noperator/CVE-2019-18935
http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html
Source: MITRE
Published: 2019-12-11
Updated: 2023-03-15
Type: CWE-502
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL