Описание
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3.4.0-3ubuntu0.1 |
| devel | not-affected | 3.5.34-1 |
| disco | ignored | end of life |
| eoan | released | 3.5.23-1ubuntu0.1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 3.4.0-3ubuntu0.1 |
| esm-infra/xenial | released | 3.3.0-1ubuntu0.1 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
ReportLab through 3.5.26 allows remote code execution because of toCol ...
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3