Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
References
| Link | Resource |
|---|---|
| https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/ | Exploit Third Party Advisory |
| https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability | Patch Vendor Advisory |
| http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2020/Apr/1 |
Configurations
Information
Published : 2020-04-02 15:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-11450
Mitre link : CVE-2020-11450
JSON object : View
Products Affected
microstrategy
- microstrategy_web
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
