Eclipse BIRT <=4.13 Remote File Retrieval via __report URL
CVE-2023-0100 Published on March 15, 2023

In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.

NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2023-0100

stack.watch emails you whenever new vulnerabilities are published in Eclipse Business Intelligence Reporting Tools or Apache Tomcat. Just hit a watch button to start following.

 
 

Affected Versions

The Eclipse Foundation Eclipse BIRT (Business Intelligence Reporting Tool):

Exploit Probability

EPSS
0.41%
Percentile
60.78%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.