Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qpg2-vx7j-3869

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

XML Injection in ReportLab

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

Ссылки

Пакеты

Наименование

reportlab

pip
Затронутые версииВерсия исправления

< 3.5.28

3.5.28

EPSS

Процентиль: 95%
0.16839
Средний

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-91

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

CVSS3: 9.8
redhat
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

CVSS3: 9.8
nvd
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

CVSS3: 9.8
debian
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toCol ...

suse-cvrf
около 6 лет назад

Security update for python-reportlab

EPSS

Процентиль: 95%
0.16839
Средний

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-91