CVE-2019-17626: XML Injection in ReportLab
(updated )
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with ‘<span color="’ followed by arbitrary Python code.
References
- access.redhat.com/errata/RHSA-2020:0195
- access.redhat.com/errata/RHSA-2020:0197
- access.redhat.com/errata/RHSA-2020:0201
- access.redhat.com/errata/RHSA-2020:0230
- access.redhat.com/security/cve/cve-2019-17626
- bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code
- bitbucket.org/rptlab/reportlab/src/default/CHANGES.md
- github.com/MrBitBucket/reportlab-mirror
- github.com/advisories/GHSA-qpg2-vx7j-3869
- github.com/pypa/advisory-database/tree/main/vulns/reportlab/PYSEC-2019-117.yaml
- hg.reportlab.com/hg-public/reportlab/rev/51a521ad7dd3
- lists.debian.org/debian-lts-announce/2020/02/msg00019.html
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSCTOE3DITFICY2XKBYZ5WAF5TSQ52DM
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZPHP2BJSTP4IYCSJRQINP763IHO6ASL
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSCTOE3DITFICY2XKBYZ5WAF5TSQ52DM
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZPHP2BJSTP4IYCSJRQINP763IHO6ASL
- nvd.nist.gov/vuln/detail/CVE-2019-17626
- security.gentoo.org/glsa/202007-35
- security.netapp.com/advisory/ntap-20240719-0006
- usn.ubuntu.com/4273-1
- web.archive.org/web/20191016111823/https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code
- www.debian.org/security/2020/dsa-4663
Detect and mitigate CVE-2019-17626 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →