CVE-2023-50786

Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*

History

07 Nov 2025, 01:11

Type Values Removed Values Added
First Time Dradisframework
Dradisframework dradis
CPE cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*
References () https://dradis.com/ - () https://dradis.com/ - Product
References () https://dradis.com/ce - () https://dradis.com/ce - Product
References () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - () https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ - Third Party Advisory

Information

Published : 2025-07-05 04:15

Updated : 2025-11-07 01:11


NVD link : CVE-2023-50786

Mitre link : CVE-2023-50786

CVE.ORG link : CVE-2023-50786


JSON object : View

Products Affected

dradisframework

  • dradis
CWE
CWE-294

Authentication Bypass by Capture-replay