CVE-2023-25262

Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
References
Link Resource
http://stimulsoft.com Vendor Advisory
https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM Broken Link
https://cves.at/posts/cve-2023-25262/writeup/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:stimulsoft:designer:2023.1.3:*:*:*:web:*:*:*
cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*

History

No history.

Information

Published : 2023-03-28 01:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-25262

Mitre link : CVE-2023-25262

CVE.ORG link : CVE-2023-25262


JSON object : View

Products Affected

stimulsoft

  • designer
CWE
CWE-918

Server-Side Request Forgery (SSRF)