U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-41372

Change History

CVE Modified by Microsoft Corporation 12/28/2023 11:15:52 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
Microsoft Corporation AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
Changed Description
Power BI Report Server Spoofing Vulnerability
<p>A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power BI Report Server Template file (pbix) containing HTML files is uploaded to the server and HTML files are accessed directly by the victim.</p>
<p>Combining these 2 vulnerabilities together, an attacker is able to upload malicious Power BI templates files to the server using the victim's session and run scripts in the security context of the user and perform privilege escalation in case the victim has admin privileges when the victim access one of the HTML files present in the malicious Power BI template uploaded.</p>
<p>The security update addresses the vulnerability by helping to ensure that Power BI Report Server properly sanitize file uploads.</p>