Описание
Reportlab vulnerable to remote code execution
Reportlab up to and including v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-33733
- https://github.com/c53elyas/CVE-2023-33733
- https://lists.debian.org/debian-lts-announce/2024/10/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ALE727IRACYBTTOFIFG57RS4OA2SHIJ
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ALE727IRACYBTTOFIFG57RS4OA2SHIJ
Пакеты
Наименование
reportlab
pip
Затронутые версииВерсия исправления
<= 3.6.12
3.6.13
Связанные уязвимости
CVSS3: 7.8
ubuntu
больше 2 лет назад
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
CVSS3: 7.8
redhat
больше 2 лет назад
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
CVSS3: 7.8
nvd
больше 2 лет назад
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
CVSS3: 7.8
debian
больше 2 лет назад
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via ...