libtaxii Server-Side Request Forgery vulnerability
Critical severity
GitHub Reviewed
Published
Apr 30, 2021
to the GitHub Advisory Database
•
Updated Sep 27, 2024
Description
Published by the National Vulnerability Database
Oct 17, 2020
Reviewed
Apr 20, 2021
Published to the GitHub Advisory Database
Apr 30, 2021
Last updated
Sep 27, 2024
"TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group.""
References