nuclei-templates/cves/2020/CVE-2020-11450.yaml

43 lines
1.5 KiB
YAML
Raw Normal View History

2022-10-07 03:51:24 +00:00
id: CVE-2020-11450
info:
name: Microstrategy Web 10.4 exposes the JVM configuration
author: tess
severity: high
2022-10-07 05:38:36 +00:00
description: |
Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture,
2022-10-07 03:51:24 +00:00
installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp.
An attacker could use this vulnerability to learn more about the environment the
application is running in. This issue has been mitigated in all versions of the
product 11.0 and higher.
reference:
- http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
2022-10-07 05:38:36 +00:00
- https://nvd.nist.gov/vuln/detail/cve-2020-11450
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11450
- https://www.redtimmy.com/web-application-hacking/another-ssrf-another-rce-the-microstrategy-case/
2022-10-07 03:51:24 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2020-11450
tags: microstrategy,exposure,jvm,config,packetstorm,cve,cve2020
2022-10-07 03:51:24 +00:00
requests:
- method: GET
path:
- '{{BaseURL}}/MicroStrategyWS/happyaxis.jsp'
redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Axis2 Happiness Page'
- 'Examining webapp configuration'
- 'Essential Components'
condition: and
- type: status
status:
- 200