Skip to content

Safety vulnerability to Server-side Request Forgery (SSRF) via img tags #18

@martin-thoma

Description

@martin-thoma

safety reports:

| package                    | installed | affected                 | ID       |
+============================+===========+==========================+==========+
| reportlab                  | 3.5.68    | >=0.0                    | 39642    |
+==============================================================================+
| All versions of package reportlab are vulnerable to Server-side Request      |
| Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes &   |
| trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan  |
| Bamal: 1. Download and install the latest package of reportlab 2. Go to      |
| demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to   |
| be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/>   |
| 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will   |
| get a hit on your nc showing we have successfully proceded to send a server  |
| side request 7. dodyssey.py will show error since there is no img file on    |
| the url, but we are able to do SSRF. See CVE-2020-28463.                     |

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions