3 results (0.049 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=580391 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 3

In Eclipse BIRT versions 4.8.0 and earlier, an attacker can use query parameters to create a JSP file which is accessible from remote (current BIRT viewer dir) to inject JSP code into the running instance. En Eclipse BIRT versiones 4.8.0 y anteriores, un atacante puede usar parámetros de consulta para crear un archivo JSP que sea accesible desde el remoto (directorio del visor BIRT actual) para inyectar código JSP en la instancia en ejecución • http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2022/Dec/30 https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142 • CWE-20: Improper Input Validation CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

In Eclipse BIRT versions 1.0 to 4.7, the Report Viewer allows Reflected XSS in URL parameter. Attacker can execute the payload in victim's browser context. En BIRT de Eclipse versiones 1.0 hasta 4.7, el Visor de Reportes permite un ataque de tipo XSS reflejado en el parámetro URL. El atacante puede ejecutar la carga útil en el contexto del navegador de la víctima. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=546816 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •