Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
Related vulnerabilities
PYSEC-2021-146
Vulnerability from pysec - Published: 2021-02-18 16:15 - Updated: 2021-08-27 03:22
VLAI?
Details
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Impacted products
| Name | purl | reportlab | pkg:pypi/reportlab |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "reportlab",
"purl": "pkg:pypi/reportlab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.55"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"2.0",
"2.3",
"2.4",
"2.5",
"2.6",
"2.7",
"3.0",
"3.1.44",
"3.1.8",
"3.2.0",
"3.3.0",
"3.4.0",
"3.5.0",
"3.5.1",
"3.5.10",
"3.5.11",
"3.5.12",
"3.5.13",
"3.5.16",
"3.5.17",
"3.5.18",
"3.5.19",
"3.5.2",
"3.5.20",
"3.5.21",
"3.5.23",
"3.5.26",
"3.5.28",
"3.5.31",
"3.5.32",
"3.5.34",
"3.5.4",
"3.5.42",
"3.5.44",
"3.5.45",
"3.5.46",
"3.5.47",
"3.5.48",
"3.5.49",
"3.5.5",
"3.5.50",
"3.5.51",
"3.5.52",
"3.5.53",
"3.5.54",
"3.5.6",
"3.5.8",
"3.5.9"
]
}
],
"aliases": [
"CVE-2020-28463",
"SNYK-PYTHON-REPORTLAB-1022145",
"GHSA-mpvw-25mg-59vx"
],
"details": "All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes \u0026 trustedHosts (see in Reportlab\u0027s documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -\u003e odyssey -\u003e dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject \u003cimg src=\"http://127.0.0.1:5000\" valign=\"top\"/\u003e 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF",
"id": "PYSEC-2021-146",
"modified": "2021-08-27T03:22:19.297131Z",
"published": "2021-02-18T16:15:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145"
},
{
"type": "WEB",
"url": "https://www.reportlab.com/docs/reportlab-userguide.pdf"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-mpvw-25mg-59vx"
}
]
}