Telerik CVE-2017-9248 Vulnerability Scanner# Telerik CVE-2017-9248 Vulnerability Scanner
A Python scanner that discovers Telerik endpoints and tests for CVE-2017-9248 cryptographic vulnerability.
## Features
- **Quick & Discovery Modes**: Single path testing or comprehensive discovery (50+ paths)
- **Multi-threaded**: Fast concurrent endpoint enumeration
- **Version Detection**: Identifies specific Telerik versions
- **Proxy Support**: Works with Burp Suite and other tools
## Installation
```
git clone https://github.com/yourusername/telerik-scanner.git
cd telerik-scanner
pip install requests
```
## Usage
### Quick Mode (Default)
```python telerik_scanner.py -u https://target.com```
### Custom Path
```python telerik_scanner.py -u https://target.com --path /admin/Telerik.Web.UI.DialogHandler.aspx```
### Discovery Mode
```python telerik_scanner.py -u https://target.com -d```
### With Proxy
```python telerik_scanner.py -u https://target.com -d -p 127.0.0.1:8080```
## Arguments
| Flag | Description | Default |
|------|-------------|---------|
| `-u, --url` | Target URL (required) | - |
| `-d, --discover` | Enable path discovery | False |
| `--path` | Specific path to test | `/Telerik.Web.UI.DialogHandler.aspx` |
| `-p, --proxy` | Proxy server | - |
| `-t, --threads` | Thread count | 10 |
## CVE-2017-9248 Details
```
- **CVSS**: 9.8 (Critical)
- **Affected**: Versions prior to 2017.2.621
- **Impact**: Cryptographic compromise, file access, potential RCE
```
## Common Paths Tested
```
/Telerik.Web.UI.DialogHandler.aspx
/telerik/Telerik.Web.UI.DialogHandler.aspx
/admin/Telerik.Web.UI.DialogHandler.aspx
/cms/Telerik.Web.UI.DialogHandler.aspx
/Telerik.Web.UI.SpellCheckHandler.axd
/RadControls/
/aspnet_client/system_web/4_0_30319/RadControls/
```
## Example Output
```
[*] Testing specific path: https://target.com/Telerik.Web.UI.DialogHandler.aspx
[+] VULNERABLE TO CVE-2017-9248!
[+] Error message: Index was outside the bounds of the array.
[+] Detected version: 2016.2.504
```
## Remediation
1. Update to Telerik 2017.2.621+
2. Review access logs
3. Implement WAF rules
4. Remove unused components
## Disclaimer
For authorized testing only. Users responsible for proper authorization.
## References
- [CVE-2017-9248](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9248)
- [Original Research](https://github.com/bao7uo/dp_crypto)
[4.0K] /data/pocs/b74c0d0275206bbf282cd5db89538bcb30bbacfe
├── [2.3K] README.md
└── [ 16K] telerik_scanner.py
0 directories, 2 files