Описание
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 4.0.4-11 |
esm-apps/noble | not-affected | 4.0.4-11 |
esm-infra/bionic | needs-triage | |
esm-infra/focal | not-affected | 3.5.34-1ubuntu1.1 |
esm-infra/xenial | needs-triage | |
focal | not-affected | 3.5.34-1ubuntu1.1 |
jammy | not-affected | 3.6.8-1ubuntu0.1 |
lunar | not-affected | 3.6.12-1ubuntu0.1 |
mantic | not-affected | 4.0.4-11 |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
paraparser in ReportLab before 3.5.31 allows remote code execution bec ...
EPSS
9.8 Critical
CVSS3