René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

88 lines
2.6 KiB
JSON

{
"id": "CVE-2023-25262",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-28T01:15:10.523",
"lastModified": "2023-04-03T18:41:36.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stimulsoft:designer:2023.1.3:*:*:*:web:*:*:*",
"matchCriteriaId": "ED354002-625C-4A34-8D5B-B296E1E4C677"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*",
"matchCriteriaId": "4481FACF-9808-45D8-A888-4625AE2CCB4E"
}
]
}
]
}
],
"references": [
{
"url": "http://stimulsoft.com",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cves.at/posts/cve-2023-25262/writeup/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}