4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF ">
Vulnerability Name: | CVE-2020-28463 (CCN-197036) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2020-11-12 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-01-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-11-30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-918 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-28463 Source: XF Type: UNKNOWN python-cve202028463-ssrf(197036) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-13cdc0ab0e Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-04bfae8300 Source: CCN Type: Python Web site reportlab Source: CCN Type: SNYK-PYTHON-REPORTLAB-1022145 Server-side Request Forgery (SSRF) Source: CONFIRM Type: Exploit, Release Notes, Third Party Advisory N/A Source: CCN Type: IBM Security Bulletin 6614909 (Spectrum Discover) IBM Spectrum Discover is vulnerable to multiple vulnerabilities Source: CONFIRM Type: Product, Vendor Advisory N/A Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-28463 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |