Lucene search

K
osvGoogleOSV:GHSA-MPVW-25MG-59VX
HistoryMar 29, 2021 - 4:32 p.m.

Server-side Request Forgery (SSRF) via img tags in reportlab

2021-03-2916:32:27
Google
osv.dev
15
reportlab
ssrf
img tags
trustedschemes
trustedhosts
odyssey
dodyssey
python3
nc listener
server side request

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

52.6%

All versions of package reportlab at time of writing are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab’s documentation)

Steps to reproduce by Karan Bamal:

  1. Download and install the latest package of reportlab
  2. Go to demos -> odyssey -> dodyssey
  3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" />
  4. Create a nc listener nc -lp 5000
  5. Run python3 dodyssey.py
  6. You will get a hit on your nc showing we have successfully proceded to send a server side request
  7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

52.6%