CVE-2020-22983

A Server-Side Request Forgery (SSRF) vulnerability exists in MicroStrategy Web SDK 11.1 and earlier, allows remote unauthenticated attackers to conduct a server-side request forgery (SSRF) attack via the srcURL parameter to the shortURL task.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microstrategy:microstrategy_web:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:13

Type Values Removed Values Added
References () http://microstrategy.com - Vendor Advisory () http://microstrategy.com - Vendor Advisory
References () http://www.yourcompany.com:8080/MicroStrategy/servlet/taskProc - Broken Link () http://www.yourcompany.com:8080/MicroStrategy/servlet/taskProc - Broken Link
References () https://medium.com/%40win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 - () https://medium.com/%40win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 -
References () https://tinyurl.com/ - Third Party Advisory () https://tinyurl.com/ - Third Party Advisory
References () https://www.microstrategy.com/us/report-a-security-vulnerability - Vendor Advisory () https://www.microstrategy.com/us/report-a-security-vulnerability - Vendor Advisory

07 Nov 2023, 03:19

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204', 'name': 'https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 -

Information

Published : 2022-05-13 13:15

Updated : 2024-11-21 05:13


NVD link : CVE-2020-22983

Mitre link : CVE-2020-22983

CVE.ORG link : CVE-2020-22983


JSON object : View

Products Affected

microstrategy

  • microstrategy_web
CWE
CWE-918

Server-Side Request Forgery (SSRF)