Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-28463— Server-side Request Forgery (SSRF)

CVSS 6.5 · Medium EPSS 1.16% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-28463

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Server-side Request Forgery (SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Description
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ReportLab 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ReportLab是丹麦ReportLab公司的一款用于创建数据驱动的PDF文档和自定义矢量图形的开源引擎。 Reportlab 中存在安全漏洞。该漏洞源于服务端可通过 img tags引发服务端请求伪造漏洞。以下产品及版本受到影响:Reportlab
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-reportlab 0 ~ unspecified -

II. Public POCs for CVE-2020-28463

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-28463

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-02-18 · 27 CVEs total

CVE-2020-284909.1 CRITICALCommand Injection
CVE-2020-284967.5 HIGHRegular Expression Denial of Service (ReDoS)
CVE-2021-233417.5 HIGHRegular Expression Denial of Service (ReDoS)
CVE-2020-284917.5 HIGHDenial of Service (DoS)
CVE-2020-284997.3 HIGHPrototype Pollution
CVE-2021-233407.1 HIGHLocal File Inclusion
CVE-2021-27379Xen 安全漏洞
CVE-2021-27375Containous Traefik 安全漏洞
CVE-2021-27124Doctor Appointment System SQL注入漏洞
CVE-2021-27378Rust rand_core 安全特征问题漏洞
CVE-2021-27377Rust yottadb 资源管理错误漏洞
CVE-2021-27376Rust nb-connect 缓冲区错误漏洞
CVE-2020-29664DJI Mavic 2 命令注入漏洞
CVE-2020-35577Endalia Selection Porta 安全漏洞
CVE-2019-18255GE Digital HMI/SCADA iFIX 权限许可和访问控制问题漏洞
CVE-2019-18243GE Digital HMI/SCADA iFIX 权限许可和访问控制问题漏洞
CVE-2020-19513FinalWire AIDA64 Engineer 缓冲区错误漏洞
CVE-2021-27329Friendica 代码问题漏洞
CVE-2021-27335KollectApps 代码问题漏洞
CVE-2020-35591Pi-hole 授权问题漏洞

Showing top 20 of 27 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-28463

No comments yet


Leave a comment