Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.
References
| Link | Resource |
|---|---|
| https://dradis.com/ | Product |
| https://dradis.com/ce | Product |
| https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ | Third Party Advisory |
| https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ | Third Party Advisory |
Configurations
History
07 Nov 2025, 01:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://dradis.com/ - Product | |
| References | () https://dradis.com/ce - Product | |
| References | () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - Third Party Advisory | |
| CPE | cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:* | |
| First Time |
Dradisframework
Dradisframework dradis |
07 Jul 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - |
05 Jul 2025, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-05 04:15
Updated : 2025-11-07 01:11
NVD link : CVE-2023-50786
Mitre link : CVE-2023-50786
CVE.ORG link : CVE-2023-50786
JSON object : View
Products Affected
dradisframework
- dradis
CWE
CWE-294
Authentication Bypass by Capture-replay
