Bypassing Dangerous File Type Execution Protection in Telegram Desktop

Bypassing Dangerous File Type Execution Protection in Telegram Desktop

CVE-2020-17448 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.

Learn more about our Cis Benchmark Audit For Desktop Software.