XXE vulnerability in Launch import
High severity
GitHub Reviewed
Published
May 11, 2020
in
reportportal/reportportal
•
Updated Feb 1, 2023
Package
Affected versions
>= 3.1.0, < 4.3.12
>= 5.0.0, < 5.1.1
Patched versions
4.3.12
5.1.1
Description
Published by the National Vulnerability Database
May 4, 2020
Reviewed
Jun 28, 2021
Published to the GitHub Advisory Database
Jun 28, 2021
Last updated
Feb 1, 2023
Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser.
We advise our users install the latest releases we built specifically to address this issue.
Patches
Fixed with reportportal/service-api#1201
Binary Download
https://bintray.com/epam/reportportal/service-api/5.1.1
https://bintray.com/epam/reportportal/service-api/4.3.12
Docker Container Download
docker pull reportportal/service-api:4.3.12
docker pull reportportal/service-api:5.1.1
Acknowledgement
The issue was reported to Report Portal Team by an external security researcher.
Our Team thanks Julien M. for reporting the issue.
For more information
If you have any questions or comments about this advisory email us: [email protected]
References