CVE-2023-25262
Published Mar 28, 2023
Last updated 2 years ago
Overview
- Description
- Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-918
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:stimulsoft:designer:2023.1.3:*:*:*:web:*:*:*", "vulnerable": true, "matchCriteriaId": "ED354002-625C-4A34-8D5B-B296E1E4C677" }, { "criteria": "cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*", "vulnerable": true, "matchCriteriaId": "4481FACF-9808-45D8-A888-4625AE2CCB4E" } ], "operator": "OR" } ] } ]