First published: Wed Jun 23 2021(Updated: )
Report portal is an open source reporting and analysis framework. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. This will be resolved in the 5.4.0 release.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reportportal Service-api | >=3.1.0<5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29620 has a medium severity rating due to the potential for XML external entity attacks.
To mitigate CVE-2021-29620, upgrade the ReportPortal service-api to a version higher than 5.4.0.
CVE-2021-29620 affects ReportPortal service-api versions from 3.1.0 to 5.4.0.
CVE-2021-29620 is associated with XML external entity (XXE) attacks.
ReportPortal service-api is an open-source reporting and analysis framework used for test automation reporting.