CVE-2020-11453

Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it to conduct port scanning. An attacker could exploit this vulnerability to enumerate the resources allocated in the network (IP addresses and services exposed). NOTE: MicroStrategy is unable to reproduce the issue reported in any version of its product
Configurations

Configuration 1 (hide)

cpe:2.3:a:microstrategy:microstrategy_web:10.4:*:*:*:*:*:*:*

History

21 Nov 2024, 04:57

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Apr/1 - () http://seclists.org/fulldisclosure/2020/Apr/1 -
References () https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability - Patch, Vendor Advisory () https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability - Patch, Vendor Advisory
References () https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ - Exploit, Third Party Advisory () https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ - Exploit, Third Party Advisory

07 Nov 2023, 03:14

Type Values Removed Values Added
Summary ** DISPUTED ** Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it to conduct port scanning. An attacker could exploit this vulnerability to enumerate the resources allocated in the network (IP addresses and services exposed). NOTE: MicroStrategy is unable to reproduce the issue reported in any version of its product. Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it to conduct port scanning. An attacker could exploit this vulnerability to enumerate the resources allocated in the network (IP addresses and services exposed). NOTE: MicroStrategy is unable to reproduce the issue reported in any version of its product

Information

Published : 2020-04-02 16:15

Updated : 2024-11-21 04:57


NVD link : CVE-2020-11453

Mitre link : CVE-2020-11453

CVE.ORG link : CVE-2020-11453


JSON object : View

Products Affected

microstrategy

  • microstrategy_web
CWE
CWE-918

Server-Side Request Forgery (SSRF)