Nov 2025 Security Patch for VitaraMaps
Security patch for potentiall SSRF vulnerability
VitaraMaps SSRF Security Patch Drop-IN –Deployment Instructions
It is designed as a drop-in replacement for VitaraMaps versions 5.3.1 through 5.3.6.
Download URL: https://vchost.vitaracharts.com/distributions/Maps/5.3.6.175/dropIn/VitaraMaps.zip
https://vchost.vitaracharts.com/distributions/Maps/5.3.6.175/dropIn/VitaraMapsLibrary.zip
This patch provides the updated security-hardened versions of fileLoader.jsp, fileLoader.aspx.
Follow the steps below to deploy the patch in all required MicroStrategy components.
1. Contents of the Patch
The patch package contains:
VitaraMaps/
fileLoader.jsp
fileLoader.aspx
VitaraMapsLibrary/
fileLoader.jsp
fileLoader.aspx
These files must overwrite the existing versions of the files in the VitaraMaps and VitaraMapsLibrary installation.
2. Where to Apply the Patch
The patch must be applied in all environments where VitaraMaps are used:
MicroStrategy Web
<WebRoot>/plugins/VitaraMaps/
MicroStrategy Library
<LibraryRoot>/plugins/VitaraMapsLibrary/
PDF Export Engine (Export Server)
<PDFExportRoot>/plugins/VitaraMaps/
Each of these components maintains its own plugins folder, so all relevant locations should be updated.
3. Deployment Steps
Step 1 — Extract the Patch
Download and unzip:
VitaraMaps.zip
VitaraMapsLibrary.zip (Library distribution only)
You will see directories:
VitaraMaps/
VitaraMapsLibrary/ (for Library only)
containing the updated fileLoader files.
Step 2 — Copy Over Existing Installation
Navigate to each MicroStrategy component’s VitaraMaps folder, for example:
<WebRoot>/plugins/VitaraMaps/
<LibraryRoot>/plugins/VitaraMapsLibrary/
<PDFExportResources>/plugins/VitaraMaps/
Then:
Copy the extracted VitaraMaps (or VitaraMapsLibrary) folder on top of the existing folder (i.e. into the ~/plugins/ folder). Alternatively you can choose to overwrite each file individually When prompted, choose Replace / Overwrite all files.
This ensures the old fileLoader logic is replaced with the secure version.
Step 3 — Restart the Web Server
After replacing the files, restart services:
Tomcat / IIS / Web Server (for MicroStrategy Web and MicroStrategy Library)
PDF Export Engine
This ensures the updated fileLoader code is picked up.
Step 4 Verification - How to Confirm Patch is Working
To verify that the SSRF protection is active, you can test the behavior of fileLoader.jsp (or fileLoader.aspx) directly using a harmless public URL such as https://vchost.vitaracharts.com/distributions/5.3.9.215/dropIn/sample.txt.
Test AFTER adding the Patch
Open the following URL in the browser:
For: MicroStrategy Web
https://<YourServer>:<port>/MicroStrategy/plugins/VitaraMaps/fileLoader.jsp?file=https://vchost.vitaracharts.com/distributions/5.3.9.215/dropIn/sample.txt
For: MicroStrategy Library
https://<YourServer>:<port>/MicroStrategy/plugins/VitaraMapsLibrary/fileLoader.jsp?file=https://vchost.vitaracharts.com/distributions/5.3.9.215/dropIn/sample.txt
Expected Result With Fix (Patch Working)
You should see a JSON response similar to:
null({status:400, msg:'host not allowed', data:'bnVsbA==', type:'null', ctx:'null'})
This means the patch is correctly blocking external URLs.
If instead the following result is seen then you’re still using the old file.
Result Without Fix:
null({status:200, msg:'success', data:'WW91IGhhdmUgbG9hZGVkIGFuIGV4dGVybmFsIHJlc291cmNlIGZyb20gVml0YXJh', type:'null', ctx:'null'})
Last updated
Was this helpful?
