Microstrategy Web 10.4 includes functionality to allow users to import files or data from external resources such as URLs or databases. By providing an external URL under attacker control, it's possible to send requests to external resources (aka SSRF) or leak files from the local system using the file:// stream wrapper.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Apr/1 | |
https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability | Patch Vendor Advisory |
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-04-02 16:15
Updated : 2020-04-03 19:15
NVD link : CVE-2020-11452
Mitre link : CVE-2020-11452
CVE.ORG link : CVE-2020-11452
JSON object : View
Products Affected
microstrategy
- microstrategy_web
CWE
CWE-918
Server-Side Request Forgery (SSRF)