Nov 2025 Security Advisory

Server-Side Request Forgery (SSRF) Vulnerability in File Loader Endpoints

Nov 2025


1. Vulnerability Description

A Server-Side Request Forgery (SSRF) vulnerability was identified in the fileLoader.jsp and fileLoader.aspx endpoints used by VitaraCharts and VitaraMaps.

These endpoints accept a file parameter, which was originally intended to load external SVG, JPEG and PNG files. However, the parameter did not sufficiently validate the requested URL or block dangerous network paths.

Impact:

Please note that the file loader is only accessible to users who have access to the MicroStrategy web server; i.e if it is deployed for access only within the enterprise intranet, then only the intranet users will be able to access the file.

If unaddressed, this issue could allow unintended access to certain internal or protected network endpoints through the server. In some cases, this might include retrieving information from internal services, cloud metadata APIs, or probing network ports. While the severity depends on each customer’s internal environment and configurations, the vulnerability could potentially allow an attacker to use the server to relay requests to locations that should not normally be accessible.

This aligns with the attack vector publicly described in CVE-2025-57305.


2. Fixes Implemented to Mitigate the Vulnerability

We implemented a multi-layered SSRF defense system across both JSP and ASPX versions of the endpoint. Each layer independently blocks malicious requests. The patch release with the fixes is expected to be made generally available by the 27th of November 2025

2.1 Strict Protocol Restrictions

Only HTTP and HTTPS URLs are allowed; all other protocols are blocked.

2.2 External Domain Allowlist

A new /custom/whitelist.txt file controls which domains can be accessed. Only domains listed there are permitted.

2.3 Private/Internal IP Blocking

All internal and localhost IP ranges (IPv4 and IPv6) are automatically blocked.

2.4 DNS Rebinding Protection

The server checks that all resolved IPs are public and not internal.

2.5 Socket-Level IP Validation

A secondary connection check ensures the actual destination IP is also public, preventing DNS tricks.

2.6 Port Restrictions

Only standard web ports (80 and 443) are allowed.

2.7 Response Size Limit

Remote responses are capped at 3 MB to prevent performance issues.

2.8 Redirect Blocking

HTTP redirects are disabled to avoid indirect access to internal systems.


3. Customer Action Required

Once the new patch is installed, customers must:

1. Provide Approved Whitelisted Domains

update the file:

  • ~/plugins/VitaraCharts/custom/whitelist.txt

This file controls which external URLs VitaraCharts is allowed to load.

Add each allowed domain on its own line. Examples:

  • svgrepo.com

  • cloud.vitaracharts.com

  • yourcompanycdn.com

2. Review External Resources in Your Dashboards

If your dashboards reference external SVG markers, background-images please ensure their hostnames are included in the whitelist file.

3. Update Older or Unsupported URLs

If your dashboards previously used:

  • internal server URLs

  • non-HTTPS URLs

  • IP addresses

IMPORTANT : These will now be blocked. Please update them to use safe, whitelisted domain names.

4. Firewall Considerations

If your environment restricts outbound traffic, ensure that MicroStrategy is allowed to reach the domains added to the whitelist.

Only explicitly allowed, public, safe domains can be accessed.

Last updated

Was this helpful?