Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-24wf-7vf2-pv59

Опубликовано: 28 июн. 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

XXE vulnerability on Launch import with externally-defined DTD file

Impact

Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.

Patches

Fixed with: https://github.com/reportportal/service-api/pull/1392

Binaries

docker pull reportportal/service-api:5.4.0 https://github.com/reportportal/service-api/packages/846871?version=5.4.0

For more information

If you have any questions or comments about this advisory email us: support@reportportal.io

Пакеты

Наименование

com.epam.reportportal:service-api

maven
Затронутые версииВерсия исправления

>= 3.1.0, < 5.4.0

5.4.0

EPSS

Процентиль: 76%
0.00962
Низкий

7.5 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

Report portal is an open source reporting and analysis framework. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. This will be resolved in the 5.4.0 release.

EPSS

Процентиль: 76%
0.00962
Низкий

7.5 High

CVSS3

Дефекты

CWE-611