Логотип exploitDog
bind:CVE-2020-28463
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28463

Количество 9

Количество 9

ubuntu логотип

CVE-2020-28463

почти 5 лет назад

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-28463

почти 5 лет назад

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2020-28463

почти 5 лет назад

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-28463

почти 5 лет назад

All versions of package reportlab are vulnerable to Server-side Reques ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2641-1

больше 4 лет назад

Security update for python-reportlab

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1147-1

больше 4 лет назад

Security update for python-reportlab

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3209-1

больше 4 лет назад

Security update for python-reportlab

EPSS: Низкий
github логотип

GHSA-mpvw-25mg-59vx

почти 5 лет назад

Server-side Request Forgery (SSRF) via img tags in reportlab

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-01492

больше 5 лет назад

Уязвимость библиотеки Python для создания PDF-файлов ReportLab, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-28463

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 6.5
1%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-28463

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 5.4
1%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-28463

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

CVSS3: 6.5
1%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-28463

All versions of package reportlab are vulnerable to Server-side Reques ...

CVSS3: 6.5
1%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2641-1

Security update for python-reportlab

1%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1147-1

Security update for python-reportlab

1%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3209-1

Security update for python-reportlab

1%
Низкий
больше 4 лет назад
github логотип
GHSA-mpvw-25mg-59vx

Server-side Request Forgery (SSRF) via img tags in reportlab

CVSS3: 6.5
1%
Низкий
почти 5 лет назад
fstec логотип
BDU:2024-01492

Уязвимость библиотеки Python для создания PDF-файлов ReportLab, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу