XXE vulnerability on Launch import with externally-defined DTD file
High severity
GitHub Reviewed
Published
Jun 23, 2021
in
reportportal/reportportal
•
Updated Feb 1, 2023
Package
Affected versions
>= 3.1.0, < 5.4.0
Patched versions
5.4.0
Description
Published by the National Vulnerability Database
Jun 23, 2021
Reviewed
Jun 25, 2021
Published to the GitHub Advisory Database
Jun 28, 2021
Last updated
Feb 1, 2023
Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
Patches
Fixed with: reportportal/service-api#1392
Binaries
docker pull reportportal/service-api:5.4.0
https://github.com/reportportal/service-api/packages/846871?version=5.4.0
For more information
If you have any questions or comments about this advisory email us: [email protected]
References