Vulnerability CVE-2020-11453


Published: 2020-04-02

Description:
Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it to conduct port scanning. An attacker could exploit this vulnerability to enumerate the resources allocated in the network (IP addresses and services exposed).

See advisories in our WLB2 database:
Topic
Author
Date
Low
MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution
redtimmysec
04.04.2020

Type:

CWE-918

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Microstrategy -> Microstrategy web 

 References:
http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
http://seclists.org/fulldisclosure/2020/Apr/1
https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/

Copyright 2024, cxsecurity.com

 

Back to Top