what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution

MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution
Posted Apr 2, 2020
Authored by redtimmysec | Site redtimmy.com

MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities.

tags | exploit, remote, web, vulnerability, code execution, xss, info disclosure
advisories | CVE-2020-11450, CVE-2020-11451, CVE-2020-11452, CVE-2020-11453, CVE-2020-11454
SHA-256 | 2e452f25b0aabc3741eb00b4ee2e86d5d200045527146eae962c28cf79d36776

MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution

Change Mirror Download
# Exploit Title: MicroStrategy Intelligence Server and Web 10.4 - 
multiple vulnerabilities
# Exploit Author: RedTimmy Security
# Authors blog:
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/
# Vendor Homepage: https://www.microstrategy.com/
# Version(s): 10.4 and possibly above
# CVE: CVE-2020-11450, CVE-2020-11451, CVE-2020-11452, CVE-2020-11453,
CVE-2020-11454

Early last autumn we have conducted an assessment on MicroStrategy
Intellitence Server & Web 10.4, that brought to the discovery of six
different vulnerabilities and recently to the registration of a total of
five CVE(s).

CVE-2020-11450 - Information Disclosure in Axis2 Happiness Page
Microstrategy Web 10.4 and possibly above exposes JVM configuration, CPU
architecture, installation folder and other info through the URL
“/MicroStrategyWS/happyaxis.jsp”. An attacker could use this
vulnerability to learn more about the environment the application is
running in.

CVE-2020-11453 - Server-Side Request Forgery in Test Web Service
Microstrategy Web 10.4 and possibly above is vulnerable to Server-Side
Request Forgery in the “Test Web Service” functionality exposed through
the path “/MicroStrategyWS/”. The functionality requires no
authentication and, while it is not possible to pass arbitrary schemes
and parameters in the SSRF request, it is still possible to exploit it
to conduct port scanning. An attacker could exploit this vulnerability
to enumerate the resources allocated in the network (IP addresses and
services exposed).

CVE-2020-11452- Server Side Request Forgery in adding external data
Microstrategy Web 10.4 and possibly above includes a functionality to
allow users to import files or data from external resources such as URLs
or databases in order to parse contents for dashboard creation. By
providing an external URL under attacker control it’s possible to send
requests to external resources or leak files from the local system using
the “file://” stream wrapper.

CVE-2020-11451 - Remote Code Execution in Upload Visualization Plugin
The “Upload Visualization” plugin in the Microstrategy admin panel
(version 10.4 and above) allows an administrator to upload a zip
archive containing files with arbitrary extensions and data. Access to
admin panel could be reached through SSRF (for example via
CVE-2020-11452).

CVE-2020-11454 - Stored Cross-Site Scripting in the Dashboard
Microstrategy Web 10.4 and possibly above is vulnerable to Stored
Cross-Site Scripting in the “HTML Container” and “Insert Text”
functionalities in the window allowing for the creation of a new
dashboard. In order to exploit this vulnerability an user need to have
access to a shared dashboard or the ability to create a dashboard on the
application.

More details and full story here:
https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close