Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00Z3JjLXE0ZmotNDVwOM4AAyIL
Improper Input Validation In Eclipse BIRT
In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.
Permalink: https://github.com/advisories/GHSA-4grc-q4fj-45p8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00Z3JjLXE0ZmotNDVwOM4AAyIL
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00128
EPSS Percentile: 0.48532
Identifiers: GHSA-4grc-q4fj-45p8, CVE-2023-0100
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-0100
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=580391
- https://github.com/eclipse/birt/pull/1165
- https://github.com/advisories/GHSA-4grc-q4fj-45p8
Blast Radius: 0.0
Affected Packages
maven:org.eclipse.birt:org.eclipse.birt.report.viewer
Dependent packages: 0Dependent repositories: 1
Downloads:
Affected Version Ranges: >= 2.6.2, < 4.13
Fixed in: 4.13
All affected versions: 4.9.0
All unaffected versions: