Описание
TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.2.0 (включая)Версия до 1.1.117 (включая)
Одно из
cpe:2.3:a:eclecticiq:opentaxii:*:*:*:*:*:*:*:*
cpe:2.3:a:libtaxii_project:libtaxii:*:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.0046
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-918
Связанные уязвимости
CVSS3: 9.8
github
почти 5 лет назад
libtaxii Server-Side Request Forgery vulnerability
EPSS
Процентиль: 64%
0.0046
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-918