Bypassing Dangerous File Type Execution Protection in Telegram Desktop
CVE-2020-17448 · HIGH Severity
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
Learn more about our Cis Benchmark Audit For Desktop Software.