Lucene search

K
githubGitHub Advisory DatabaseGHSA-4GRC-Q4FJ-45P8
HistoryMar 15, 2023 - 3:30 p.m.

Improper Input Validation In Eclipse BIRT

2023-03-1515:30:22
CWE-20
GitHub Advisory Database
github.com
16
eclipse birt
input validation
http path
report retrieval
vulnerability
patch
apache tomcat

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.3%

In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.

Affected configurations

Vulners
Node
-org.eclipse.birt\Matchorg.eclipse.birt.report.viewer
OR
-org.eclipse.birt\Matchorg.eclipse.birt.report.viewer

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.3%