Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-11453 | 1 Microstrategy | 1 Microstrategy Web | 2024-08-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it to conduct port scanning. An attacker could exploit this vulnerability to enumerate the resources allocated in the network (IP addresses and services exposed). NOTE: MicroStrategy is unable to reproduce the issue reported in any version of its product | |||||
CVE-2020-22983 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 5.8 MEDIUM | 8.1 HIGH |
A Server-Side Request Forgery (SSRF) vulnerability exists in MicroStrategy Web SDK 11.1 and earlier, allows remote unauthenticated attackers to conduct a server-side request forgery (SSRF) attack via the srcURL parameter to the shortURL task. | |||||
CVE-2020-11450 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher. | |||||
CVE-2020-11452 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
Microstrategy Web 10.4 includes functionality to allow users to import files or data from external resources such as URLs or databases. By providing an external URL under attacker control, it's possible to send requests to external resources (aka SSRF) or leak files from the local system using the file:// stream wrapper. | |||||
CVE-2020-11451 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
The Upload Visualization plugin in the Microstrategy Web 10.4 admin panel allows an administrator to upload a ZIP archive containing files with arbitrary extensions and data. (This is also exploitable via SSRF). Note: The ability to upload visualization plugins requires administrator privileges. | |||||
CVE-2020-11454 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
Microstrategy Web 10.4 is vulnerable to Stored XSS in the HTML Container and Insert Text features in the window, allowing for the creation of a new dashboard. In order to exploit this vulnerability, a user needs to get access to a shared dashboard or have the ability to create a dashboard on the application. | |||||
CVE-2019-12453 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
In MicroStrategy Web before 10.1 patch 10, stored XSS is possible in the FLTB parameter due to missing input validation. | |||||
CVE-2019-12475 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
In MicroStrategy Web before 10.4.6, there is stored XSS in metric due to insufficient input validation. | |||||
CVE-2018-18775 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter. NOTE: this is a deprecated product. | |||||
CVE-2018-18776 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the admin/admin.asp ShowAll parameter. NOTE: this is a deprecated product. | |||||
CVE-2018-18777 | 1 Microstrategy | 1 Microstrategy Web | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. |