Lucene search

K
osvGoogleOSV:GHSA-35JJ-WX47-4W8R
HistoryMar 08, 2024 - 8:42 p.m.

WeasyPrint allows the attachment of arbitrary files and URLs to a PDF

2024-03-0820:42:52
Google
osv.dev
4
weasyprint
vulnerability
attachment
pdf
arbitrary files
urls
version 61.0
patches
734ee8e
61.2
workarounds
sandbox

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

Impact

Since version 61.0, there’s a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if url_fetcher is configured to prevent access to files and URLs.

Patches

Fixed by 734ee8e that’s included in 61.2

Workarounds

  • Check that no PDF attachment is defined in source HTML.
  • Launch WeasyPrint in a sandbox that prevents access to the filesystem and the network.
CPENameOperatorVersion
weasyprinteq61.0
weasyprinteq61.1

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%