CVE-2020-28463 – reportlab
Package
Manager: pip
Name: reportlab
Vulnerable Version: <=3.5.68
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00671 pctl0.70469
Details
Server-side Request Forgery (SSRF) via img tags in reportlab All versions of package reportlab at time of writing are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject `<img src="http://127.0.0.1:5000" valign="top"/>` 4. Create a nc listener `nc -lp 5000` 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Metadata
Created: 2021-03-29T16:32:27Z
Modified: 2024-10-26T18:34:55Z
Source: MANUAL
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-mpvw-25mg-59vx
Finding: F100
Auto approve: 1