Lucene search

K
debianDebianDEBIAN:DLA-3590-1:ECFE8
HistorySep 29, 2023 - 7:57 p.m.

[SECURITY] [DLA 3590-1] python-reportlab security update

2023-09-2919:57:57
lists.debian.org
6
python
reportlab
pdfs
graphics
remote code execution
authorization bypass
ssrf
debian 10 buster

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

52.1%


Debian LTS Advisory DLA-3590-1 [email protected]
https://www.debian.org/lts/security/ Guilhem Moulin
September 29, 2023 https://wiki.debian.org/LTS

Package : python-reportlab
Version : 3.5.13-1+deb10u2
CVE ID : CVE-2019-19450 CVE-2020-28463

Security issues were discovered in python-reportlab, a Python library
for generating PDFs and graphics, which could lead to remote code
execution or authorization bypass.

CVE-2019-19450

Ravi Prakash Giri discovered a remote code execution vulnerability
via crafted XML document where β€˜<unichar code="’ is followed by
arbitrary Python code.

This issue is similar to CVE-2019-17626.

CVE-2020-28463

Karan Bamal discovered a Server-side Request Forgery (SSRF)
vulnerability via β€˜<img>’ tags.  New settings β€˜trustedSchemes’ and
β€˜trustedHosts’ have been added as part of the fix/mitigation: they
can be used to specify an explicit allowlist for remote sources.

For Debian 10 buster, these problems have been fixed in version
3.5.13-1+deb10u2.

We recommend that you upgrade your python-reportlab packages.

For the detailed security status of python-reportlab please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-reportlab

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

52.1%