Bug 1930416 (CVE-2020-28463)

Summary: CVE-2020-28463 python-reportlab: Server-side request forgery via img tags
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, bdpepple, i, icon, mkasik, peter, trpost, williamjmorenor
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in python-reportlab. A Server-side Request Forgery (SSRF) vulnerability is possible via img tags.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1930417, 1933896    
Bug Blocks: 1930418    

Description Pedro Sampaio 2021-02-18 20:17:52 UTC
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags.

References:

https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145
https://www.reportlab.com/docs/reportlab-userguide.pdf

Comment 1 Pedro Sampaio 2021-02-18 20:18:18 UTC
Created python-reportlab tracking bugs for this issue:

Affects: fedora-all [bug 1930417]

Comment 3 Jason Shepherd 2021-02-22 05:03:04 UTC
Set CVSS Confidentiality metrics to Low and Integrity to Low because the contents of the attacked address aren't disclosed, only the presence of the address and potentially the Integrity if the address allows state changing actions via HTTP get method.

Comment 4 Mark Cooper 2021-02-23 00:02:04 UTC
External References:

https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145

Comment 7 Todd Cullum 2021-03-02 00:36:34 UTC
Statement:

This flaw is out of support scope for the following products:

* Red Hat Enterprise Linux 6
* Red Hat Enterprise Linux 7

To learn more about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata/