ID |
CVE-2020-28463
|
Summary |
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*
cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.0 (as of 29-09-2023 - 22:15) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-918 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
Last major update |
29-09-2023 - 22:15 |
Published |
18-02-2021 - 16:15 |
Last modified |
29-09-2023 - 22:15 |