Eclipse BIRT <=4.13 Remote File Retrieval via __report URL
CVE-2023-0100 Published on March 15, 2023
In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2023-0100
stack.watch emails you whenever new vulnerabilities are published in Eclipse Business Intelligence Reporting Tools or Apache Tomcat. Just hit a watch button to start following.
Affected Versions
The Eclipse Foundation Eclipse BIRT (Business Intelligence Reporting Tool):- Version 2.6.2 and below unspecified is affected.
- Version unspecified and below 4.13 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.