CVE-2023-50786

Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*

History

07 Nov 2025, 01:11

Type Values Removed Values Added
References () https://dradis.com/ - () https://dradis.com/ - Product
References () https://dradis.com/ce - () https://dradis.com/ce - Product
References () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - Third Party Advisory
CPE cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*
First Time Dradisframework
Dradisframework dradis

07 Jul 2025, 19:15

Type Values Removed Values Added
Summary
  • (es) Dradis, hasta la versión 4.16.0, permite referenciar imágenes externas (recursos) mediante HTTPS, en lugar de forzar el uso de imágenes incrustadas (subidas). Esto puede ser aprovechado por un autor autorizado para intentar robar los hashes Net-NTLM de otros autores en una red de dominio Windows.
References () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ -

05 Jul 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-05 04:15

Updated : 2025-11-07 01:11


NVD link : CVE-2023-50786

Mitre link : CVE-2023-50786

CVE.ORG link : CVE-2023-50786


JSON object : View

Products Affected

dradisframework

  • dradis
CWE
CWE-294

Authentication Bypass by Capture-replay