Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
References
Link | Resource |
---|---|
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ | Exploit Third Party Advisory |
https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability | Patch Vendor Advisory |
http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Apr/1 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-04-02 08:15
Updated : 2022-04-22 12:07
NVD link : CVE-2020-11450
Mitre link : CVE-2020-11450
JSON object : View
CWE
Products Affected
microstrategy
- microstrategy_web