Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
References
Link | Resource |
---|---|
http://stimulsoft.com | Vendor Advisory |
https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM | Broken Link |
https://cves.at/posts/cve-2023-25262/writeup/ | Exploit Third Party Advisory |
http://stimulsoft.com | Vendor Advisory |
https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM | Broken Link |
https://cves.at/posts/cve-2023-25262/writeup/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://stimulsoft.com - Vendor Advisory | |
References | () https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM - Broken Link | |
References | () https://cves.at/posts/cve-2023-25262/writeup/ - Exploit, Third Party Advisory |
Information
Published : 2023-03-28 01:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25262
Mitre link : CVE-2023-25262
CVE.ORG link : CVE-2023-25262
JSON object : View
Products Affected
stimulsoft
- designer
CWE
CWE-918
Server-Side Request Forgery (SSRF)