Vulnerabilities > CVE-2020-11450 - Unspecified vulnerability in Microstrategy web
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/157068/msisw104-disclosessrfexecxss.txt |
id | PACKETSTORM:157068 |
last seen | 2020-04-03 |
published | 2020-04-02 |
reporter | redtimmysec |
source | https://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html |
title | MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution |
References
- http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
- http://seclists.org/fulldisclosure/2020/Apr/1
- https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability
- https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/
- http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
- https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/
- https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability
- http://seclists.org/fulldisclosure/2020/Apr/1