In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
References
Link | Resource |
---|---|
http://stimulsoft.com | Product |
https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa | Broken Link |
https://cves.at/posts/cve-2023-25263/writeup/ | Exploit Third Party Advisory |
http://stimulsoft.com | Product |
https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa | Broken Link |
https://cves.at/posts/cve-2023-25263/writeup/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://stimulsoft.com - Product | |
References | () https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa - Broken Link | |
References | () https://cves.at/posts/cve-2023-25263/writeup/ - Exploit, Third Party Advisory |
Information
Published : 2023-03-27 21:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25263
Mitre link : CVE-2023-25263
CVE.ORG link : CVE-2023-25263
JSON object : View
Products Affected
stimulsoft
- designer
CWE
CWE-312
Cleartext Storage of Sensitive Information