GHSA-836c-xg97-8p4h

Suggest an improvement
Source
https://github.com/advisories/GHSA-836c-xg97-8p4h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-836c-xg97-8p4h/GHSA-836c-xg97-8p4h.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-836c-xg97-8p4h
Aliases
Published
2021-04-30T17:34:48Z
Modified
2025-02-18T05:30:57.932280Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
libtaxii Server-Side Request Forgery vulnerability
Details

"TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group.""

Database specific
{
    "nvd_published_at": "2020-10-17T20:15:00Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-20T17:53:43Z"
}
References

Affected packages

PyPI / libtaxii

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.118

Affected versions

1.*

1.0.090
1.0.100
1.0.101
1.0.103
1.0.104
1.0.105
1.0.106
1.0.107
1.1.100
1.1.101
1.1.102
1.1.103
1.1.104
1.1.105
1.1.106
1.1.107
1.1.108
1.1.109
1.1.110
1.1.111
1.1.112
1.1.113
1.1.114
1.1.115
1.1.116
1.1.117