CVE-2023-25263

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:desktop:*:*:*
cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*
cpe:2.3:a:stimulsoft:designer:2023.1.5:*:*:*:desktop:*:*:*
cpe:2.3:a:stimulsoft:designer:2023.1.5:*:*:*:web:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () http://stimulsoft.com - Product () http://stimulsoft.com - Product
References () https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa - Broken Link () https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa - Broken Link
References () https://cves.at/posts/cve-2023-25263/writeup/ - Exploit, Third Party Advisory () https://cves.at/posts/cve-2023-25263/writeup/ - Exploit, Third Party Advisory

Information

Published : 2023-03-27 21:15

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25263

Mitre link : CVE-2023-25263

CVE.ORG link : CVE-2023-25263


JSON object : View

Products Affected

stimulsoft

  • designer
CWE
CWE-312

Cleartext Storage of Sensitive Information