lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1cb75a2a665d826526417033f7ca2966@redtimmy.com>
Date: Wed, 01 Apr 2020 21:43:58 +0200
From: Red Timmy Security <publications@...timmy.com>
To: fulldisclosure@...lists.org
Subject: [FD] MicroStrategy Intelligence Server and Web 10.4 - multiple
 vulnerabilities

Hi,
early last autumn we have conducted an assessment on MicroStrategy 
Intellitence Server & Web 10.4, that brought to the discovery of six 
different vulnerabilities and recently at the registration of a total of 
five CVE(s).

CVE-2020-11450 - Information Disclosure in Axis2 Happiness Page
Microstrategy Web 10.4 and possibly above exposes JVM configuration, CPU 
architecture, installation folder and other info through the URL 
“/MicroStrategyWS/happyaxis.jsp”. An attacker could use this 
vulnerability to learn more about the environment the application is 
running in.

CVE-2020-11453 - Server-Side Request Forgery in Test Web Service
Microstrategy Web 10.4 and possibly above is vulnerable to Server-Side 
Request Forgery in the “Test Web Service” functionality exposed through 
the path “/MicroStrategyWS/”. The functionality requires no 
authentication and, while it is not possible to pass arbitrary schemes 
and parameters in the SSRF request, it is still possible to exploit it 
to conduct port scanning. An attacker could exploit this vulnerability 
to enumerate the resources allocated in the network (IP addresses and 
services exposed).

CVE-2020-11452- Server Side Request Forgery in adding external data
Microstrategy Web 10.4 and possibly above includes a functionality to 
allow users to import files or data from external resources such as URLs 
or databases in order to parse contents for dashboard creation. By 
providing an external URL under attacker control it’s possible to send 
requests to external resources or leak files from the local system using 
the “file://” stream wrapper.

CVE-2020-11451 - Remote Code Execution in Upload Visualization Plugin
The “Upload Visualization” plugin in the Microstrategy admin panel 
(version 10.4 and above) allows an administrator to upload a zip
archive containing files with arbitrary extensions and data. Access to 
admin panel could be reached through SSRF (for example via 
CVE-2020-11452).

CVE-2020-11454 - Stored Cross-Site Scripting in the Dashboard
Microstrategy Web 10.4 and possibly above is vulnerable to Stored 
Cross-Site Scripting in the “HTML Container” and “Insert Text”
functionalities in the window allowing for the creation of a new 
dashboard. In order to exploit this vulnerability an user need to have 
access to a shared dashboard or the ability to create a dashboard on the 
application.

More details and full story here:
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/

regards

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ