Server-Side Request Forgery (SSRF) Affecting python3-reportlab package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.25% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-PYTHON3REPORTLAB-1346605
  • published26 Jul 2021
  • disclosed18 Feb 2021

Introduced: 18 Feb 2021

CVE-2020-28463  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 python3-reportlab.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3-reportlab package and not the python3-reportlab package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000&#34; valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS Scores

version 3.1