Lucene search

K
githubGitHub Advisory DatabaseGHSA-35JJ-WX47-4W8R
HistoryMar 08, 2024 - 8:42 p.m.

WeasyPrint allows the attachment of arbitrary files and URLs to a PDF

2024-03-0820:42:52
CWE-829
GitHub Advisory Database
github.com
9
weasyprint
pdf
vulnerability
arbitrary files
urls
version 61.0
patch
734ee8e
sandbox

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%

Impact

Since version 61.0, there’s a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if url_fetcher is configured to prevent access to files and URLs.

Patches

Fixed by 734ee8e that’s included in 61.2

Workarounds

  • Check that no PDF attachment is defined in source HTML.
  • Launch WeasyPrint in a sandbox that prevents access to the filesystem and the network.

Affected configurations

Vulners
Node
weasyprintRange61.1
CPENameOperatorVersion
weasyprintle61.1

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%