CVE-2020-13576

NameCVE-2020-13576
DescriptionA code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3745-1
Debian Bugs983596

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gsoap (PTS)bullseye2.8.104-3fixed
bookworm2.8.124-2fixed
sid, trixie2.8.132-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gsoapsourcebuster2.8.75-1+deb10u1DLA-3745-1
gsoapsource(unstable)2.8.104-3983596

Notes

[stretch] - gsoap <ignored> (intrusive to backport, will either not compile or may cause runtime errors)
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187

Search for package or bug name: Reporting problems