Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2jx8-v4hv-gx3h

Опубликовано: 28 июн. 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

XXE vulnerability in Launch import

Release DateAffected ProjectsAffected VersionsAccess VectorSecurity Risk
Monday, May 4, 2020service-apiEvery version, starting from 3.1.0RemoteMedium

Impact

Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.

Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser.

We advise our users install the latest releases we built specifically to address this issue.

Patches

Fixed with https://github.com/reportportal/service-api/pull/1201

Binary Download

https://bintray.com/epam/reportportal/service-api/5.1.1 https://bintray.com/epam/reportportal/service-api/4.3.12

Docker Container Download

  • RP v4: docker pull reportportal/service-api:4.3.12
  • RP v5: docker pull reportportal/service-api:5.1.1

Acknowledgement

The issue was reported to Report Portal Team by an external security researcher. Our Team thanks Julien M. for reporting the issue.

For more information

If you have any questions or comments about this advisory email us: support@reportportal.io

Пакеты

Наименование

com.epam.reportportal:service-api

maven
Затронутые версииВерсия исправления

>= 3.1.0, < 4.3.12

4.3.12

Наименование

com.epam.reportportal:service-api

maven
Затронутые версииВерсия исправления

>= 5.0.0, < 5.1.1

5.1.1

EPSS

Процентиль: 51%
0.0028
Низкий

7.5 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

An issue was discovered in service-api before 4.3.12 and 5.x before 5.1.1 for Report Portal. It allows XXE, with resultant secrets disclosure and SSRF, via JUnit XML launch import.

EPSS

Процентиль: 51%
0.0028
Низкий

7.5 High

CVSS3

Дефекты

CWE-611