All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
References
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HMUJA5GZTPQ5WRYUCCK2GEZM4W43N7HH/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/ - | |
References | () https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145 - Exploit, Release Notes, Third Party Advisory | |
References | () https://www.reportlab.com/docs/reportlab-userguide.pdf - Product, Vendor Advisory |
07 Nov 2023, 03:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
29 Sep 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-02-18 16:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28463
Mitre link : CVE-2020-28463
CVE.ORG link : CVE-2020-28463
JSON object : View
Products Affected
fedoraproject
- fedora
reportlab
- reportlab
CWE
CWE-918
Server-Side Request Forgery (SSRF)