Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19450

Опубликовано: 20 сент. 2023
Источник: debian

Описание

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-reportlabfixed3.5.31-1package

Примечания

  • https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019

  • Fixed by: https://hg.reportlab.com/hg-public/reportlab/rev/b117091a73c2

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
redhat
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
nvd
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

suse-cvrf
почти 2 года назад

Security update for python-reportlab

suse-cvrf
почти 2 года назад

Security update for python-reportlab