Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-73jg-p8q6-m47j

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A Server-Side Request Forgery (SSRF) affecting the PDF generation in MicroStrategy 10.4, 2019 before Update 6, and 2020 before Update 2 allows authenticated users to access the content of internal network resources or leak files from the local system via HTML containers embedded in a dossier/dashboard document. NOTE: 10.4., no fix will be released as version will reach end-of-life on 31/12/2020.

A Server-Side Request Forgery (SSRF) affecting the PDF generation in MicroStrategy 10.4, 2019 before Update 6, and 2020 before Update 2 allows authenticated users to access the content of internal network resources or leak files from the local system via HTML containers embedded in a dossier/dashboard document. NOTE: 10.4., no fix will be released as version will reach end-of-life on 31/12/2020.

EPSS

Процентиль: 92%
0.07537
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 6.5
nvd
около 5 лет назад

A Server-Side Request Forgery (SSRF) affecting the PDF generation in MicroStrategy 10.4, 2019 before Update 6, and 2020 before Update 2 allows authenticated users to access the content of internal network resources or leak files from the local system via HTML containers embedded in a dossier/dashboard document. NOTE: 10.4., no fix will be released as version will reach end-of-life on 31/12/2020.

EPSS

Процентиль: 92%
0.07537
Низкий

Дефекты

CWE-918