Описание
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.
Отчет
To exploit the issue, a malicious user has to use a crafted malicious html 'unichar' tag input and then use the reportlab's feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact. This vulnerability is similar to CVE-2019-17626.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | python-reportlab | Out of support scope | ||
Red Hat Enterprise Linux 7 | python-reportlab | Fixed | RHSA-2023:5616 | 10.10.2023 |
Red Hat Enterprise Linux 8 | python-reportlab | Fixed | RHSA-2023:5790 | 17.10.2023 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | python-reportlab | Fixed | RHSA-2023:5789 | 17.10.2023 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | python-reportlab | Fixed | RHSA-2023:5788 | 17.10.2023 |
Red Hat Enterprise Linux 8.2 Telecommunications Update Service | python-reportlab | Fixed | RHSA-2023:5788 | 17.10.2023 |
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | python-reportlab | Fixed | RHSA-2023:5788 | 17.10.2023 |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | python-reportlab | Fixed | RHSA-2023:5787 | 17.10.2023 |
Red Hat Enterprise Linux 8.4 Telecommunications Update Service | python-reportlab | Fixed | RHSA-2023:5787 | 17.10.2023 |
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | python-reportlab | Fixed | RHSA-2023:5787 | 17.10.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
paraparser in ReportLab before 3.5.31 allows remote code execution bec ...
EPSS
9.8 Critical
CVSS3