Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.
References
| Link | Resource |
|---|---|
| https://dradis.com/ | Product |
| https://dradis.com/ce | Product |
| https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ | Third Party Advisory |
| https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-05 04:15
Updated : 2025-11-07 01:11
NVD link : CVE-2023-50786
Mitre link : CVE-2023-50786
CVE.ORG link : CVE-2023-50786
JSON object : View
Products Affected
dradisframework
- dradis
CWE
CWE-294
Authentication Bypass by Capture-replay
