Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19450

Опубликовано: 20 сент. 2023
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.

Отчет

To exploit the issue, a malicious user has to use a crafted malicious html 'unichar' tag input and then use the reportlab's feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact. This vulnerability is similar to CVE-2019-17626.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6python-reportlabOut of support scope
Red Hat Enterprise Linux 7python-reportlabFixedRHSA-2023:561610.10.2023
Red Hat Enterprise Linux 8python-reportlabFixedRHSA-2023:579017.10.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionspython-reportlabFixedRHSA-2023:578917.10.2023
Red Hat Enterprise Linux 8.2 Advanced Update Supportpython-reportlabFixedRHSA-2023:578817.10.2023
Red Hat Enterprise Linux 8.2 Telecommunications Update Servicepython-reportlabFixedRHSA-2023:578817.10.2023
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutionspython-reportlabFixedRHSA-2023:578817.10.2023
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportpython-reportlabFixedRHSA-2023:578717.10.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicepython-reportlabFixedRHSA-2023:578717.10.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionspython-reportlabFixedRHSA-2023:578717.10.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-91
https://bugzilla.redhat.com/show_bug.cgi?id=2239920python-reportlab: code injection in paraparser.py allows code execution

EPSS

Процентиль: 91%
0.06429
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
nvd
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

CVSS3: 9.8
debian
почти 2 года назад

paraparser in ReportLab before 3.5.31 allows remote code execution bec ...

suse-cvrf
почти 2 года назад

Security update for python-reportlab

suse-cvrf
почти 2 года назад

Security update for python-reportlab

EPSS

Процентиль: 91%
0.06429
Низкий

9.8 Critical

CVSS3