6.5
CVSSv3

CVE-2020-24815

Published: 24/11/2020 Updated: 02/12/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

A Server-Side Request Forgery (SSRF) affecting the PDF generation in MicroStrategy 10.4, 2019 before Update 6, and 2020 before Update 2 allows authenticated users to access the content of internal network resources or leak files from the local system via HTML containers embedded in a dossier/dashboard document. NOTE: 10.4., no fix will be released as version will reach end-of-life on 31/12/2020.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microstrategy microstrategy 10.4

microstrategy microstrategy 2019

microstrategy microstrategy 2020

Github Repositories

exploit-CVE-2020-24815py this is my first exploit for CVE-2020-24815 put the POST path after url !!!!Example: if the script not work change the cookie on script $ -> pip install -r requirementstxt fix probleme pdftotext not installed: $ -> sudo apt-get install build-essential libpoppler-cpp-dev pkg-config python3-dev

exploit-CVE-2020-24815py this is my first exploit for CVE-2020-24815 put the POST path after url !!!!Example: if the script not work change the cookie on script $ -> pip install -r requirementstxt fix probleme pdftotext not installed: $ -> sudo apt-get install build-essential libpoppler-cpp-dev pkg-config python3-dev