paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3590-1 | python-reportlab security update |
Github GHSA |
GHSA-pj98-2xf6-cff5 | ReportLab vulnerable to remote code execution via paraparser |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:16:47.205Z
Reserved: 2019-11-29T00:00:00
Link: CVE-2019-19450
No data.
Status : Modified
Published: 2023-09-20T14:15:12.310
Modified: 2024-11-21T04:34:45.463
Link: CVE-2019-19450
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA