Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ | Exploit Third Party Advisory | 
| https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability | Patch Vendor Advisory | 
| http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2020/Apr/1 | Mailing List Third Party Advisory | 
Configurations
                    Information
                Published : 2020-04-02 08:15
Updated : 2022-04-22 12:07
NVD link : CVE-2020-11450
Mitre link : CVE-2020-11450
JSON object : View
CWE
                Products Affected
                microstrategy
- microstrategy_web
 


