-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2020-28463 - Medium Severity Vulnerability
Vulnerable Library - reportlab-3.5.42-cp36-cp36m-manylinux2010_x86_64.whl
The Reportlab Toolkit
Library home page: https://files.pythonhosted.org/packages/63/a2/81b959f0d25660dc466bc0fe675c65e331f3264b4e39254a3b277bef2cec/reportlab-3.5.42-cp36-cp36m-manylinux2010_x86_64.whl
Path to dependency file: testplan/requirements.txt
Path to vulnerable library: testplan/requirements.txt,testplan
Dependency Hierarchy:
- ❌ reportlab-3.5.42-cp36-cp36m-manylinux2010_x86_64.whl (Vulnerable Library)
Vulnerability Details
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Publish Date: 2021-02-18
URL: CVE-2020-28463
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None