All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3590-1 python-reportlab security update
EUVD EUVD EUVD-2021-0223 All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src=\"http://127.0.0.1:5000\" valign=\"top\"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Github GHSA Github GHSA GHSA-mpvw-25mg-59vx Server-side Request Forgery (SSRF) via img tags in reportlab
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T01:27:03.761Z

Reserved: 2020-11-12T00:00:00

Link: CVE-2020-28463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-18T16:15:12.707

Modified: 2024-11-21T05:22:51.133

Link: CVE-2020-28463

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-18T00:00:00Z

Links: CVE-2020-28463 - Bugzilla

cve-icon OpenCVE Enrichment

No data.