Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17626

Опубликовано: 16 окт. 2019
Источник: redhat
CVSS3: 9.8
EPSS Средний

Описание

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

A code injection vulnerability in python-reportlab allows an attacker to execute code while parsing a color attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable to this flaw and allow remote code execution.

Отчет

This vulnerability will not be fixed in Red Hat Quay because it only affects a non-supported feature which is disabled behind a feature flag.

Меры по смягчению последствий

No known mitigation available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Quay 3quayWill not fix
Red Hat Enterprise Linux 6python-reportlabFixedRHSA-2020:019721.01.2020
Red Hat Enterprise Linux 7python-reportlabFixedRHSA-2020:019521.01.2020
Red Hat Enterprise Linux 8python-reportlabFixedRHSA-2020:020124.01.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutionspython-reportlabFixedRHSA-2020:023027.01.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-95
https://bugzilla.redhat.com/show_bug.cgi?id=1769661python-reportlab: code injection in colors.py allows attacker to execute code

EPSS

Процентиль: 95%
0.16839
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

CVSS3: 9.8
nvd
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

CVSS3: 9.8
debian
больше 6 лет назад

ReportLab through 3.5.26 allows remote code execution because of toCol ...

suse-cvrf
около 6 лет назад

Security update for python-reportlab

suse-cvrf
около 6 лет назад

Security update for python-reportlab

EPSS

Процентиль: 95%
0.16839
Средний

9.8 Critical

CVSS3