CVE-2021-29620

Source
https://cve.org/CVERecord?id=CVE-2021-29620
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29620.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-29620
Aliases
Related
Published
2021-06-23T18:15:09.203Z
Modified
2026-04-12T02:46:13.694575Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Report portal is an open source reporting and analysis framework. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. This will be resolved in the 5.4.0 release.

References

Affected packages

Git / github.com/reportportal/service-api

Affected ranges

Type
GIT
Repo
https://github.com/reportportal/service-api
Events
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "3.1.0"
        },
        {
            "fixed": "5.4.0"
        }
    ],
    "cpe": "cpe:2.3:a:reportportal:service-api:*:*:*:*:*:*:*:*"
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29620.json"