logo

CVE-2023-0100 org.eclipse.birt:org.eclipse.birt.report.viewer

Package

Manager: maven
Name: org.eclipse.birt:org.eclipse.birt.report.viewer
Vulnerable Version: >=2.6.2 <4.13

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00335 pctl0.55748

Details

Improper Input Validation In Eclipse BIRT In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.

Metadata

Created: 2023-03-15T15:30:22Z
Modified: 2023-03-22T19:54:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-4grc-q4fj-45p8/GHSA-4grc-q4fj-45p8.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-4grc-q4fj-45p8
Finding: F184
Auto approve: 1