CVE-2019-19450 – reportlab
Package
Manager: pip
Name: reportlab
Vulnerable Version: >=0 <3.5.31
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.09484 pctl0.92521
Details
ReportLab vulnerable to remote code execution via paraparser paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
Metadata
Created: 2023-09-20T15:30:51Z
Modified: 2024-04-28T06:31:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-pj98-2xf6-cff5/GHSA-pj98-2xf6-cff5.json
CWE IDs: ["CWE-91"]
Alternative ID: GHSA-pj98-2xf6-cff5
Finding: F021
Auto approve: 1