CVE-2023-25262

Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:stimulsoft:designer:2023.1.3:*:*:*:web:*:*:*
cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () http://stimulsoft.com - Vendor Advisory () http://stimulsoft.com - Vendor Advisory
References () https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM - Broken Link () https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM - Broken Link
References () https://cves.at/posts/cve-2023-25262/writeup/ - Exploit, Third Party Advisory () https://cves.at/posts/cve-2023-25262/writeup/ - Exploit, Third Party Advisory

Information

Published : 2023-03-28 01:15

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25262

Mitre link : CVE-2023-25262

CVE.ORG link : CVE-2023-25262


JSON object : View

Products Affected

stimulsoft

  • designer
CWE
CWE-918

Server-Side Request Forgery (SSRF)