Bugzilla – Bug 1182098
VUL-0: CVE-2020-13576: gsoap: remote code execution via specially crafted SOAP request inside the WS-Addressing plugin
Last modified: 2021-05-04 13:16:34 UTC
CVE-2020-13576 A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13576 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13576 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187
This is an autogenerated message for OBS integration: This bug (1182098) was mentioned in https://build.opensuse.org/request/show/888570 15.2 / gsoap https://build.opensuse.org/request/show/888571 Backports:SLE-15-SP3 / gsoap
Submissions posted.
openSUSE-SU-2021:0632-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1182098 CVE References: CVE-2020-13576 JIRA References: Sources used: openSUSE Leap 15.2 (src): gsoap-2.8.102-lp152.2.3.1
openSUSE-SU-2021:0664-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1182098 CVE References: CVE-2020-13576 JIRA References: Sources used: openSUSE Backports SLE-15-SP2 (src): gsoap-2.8.102-bp152.2.4.1