Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pj98-2xf6-cff5

Опубликовано: 20 сент. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

ReportLab vulnerable to remote code execution via paraparser

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

Пакеты

Наименование

reportlab

pip
Затронутые версииВерсия исправления

< 3.5.31

3.5.31

EPSS

Процентиль: 93%
0.09484
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-91

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
redhat
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
nvd
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
debian
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution bec ...

suse-cvrf
почти 2 года назад

Security update for python-reportlab

EPSS

Процентиль: 93%
0.09484
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-91