PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phpoffice
Phpoffice phpspreadsheet |
|
CPEs | cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:* | |
Vendors & Products |
Phpoffice
Phpoffice phpspreadsheet |
|
Metrics |
ssvc
|
Mon, 07 Oct 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Path traversal and Server-Side Request Forgery when opening XLSX files in PHPSpreadsheet | |
Weaknesses | CWE-36 CWE-918 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-07T20:12:38.190Z
Updated: 2024-10-08T18:31:06.318Z
Reserved: 2024-08-26T18:25:35.442Z
Link: CVE-2024-45290
Vulnrichment
Updated: 2024-10-08T18:30:57.942Z
NVD
Status : Analyzed
Published: 2024-10-07T21:15:17.397
Modified: 2024-10-16T19:54:53.397
Link: CVE-2024-45290
Redhat
No data.