paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with <unichar code= followed by arbitrary Python code, a similar issue to CVE-2019-17626.
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Reportlab | Reportlab | * | 3.5.31 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | python-reportlab-0:2.5-11.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | python-reportlab-0:3.4.0-8.el8_8.1 | * |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | RedHat | python-reportlab-0:3.4.0-6.el8_1.5 | * |
Red Hat Enterprise Linux 8.2 Advanced Update Support | RedHat | python-reportlab-0:3.4.0-8.el8_2.1 | * |
Red Hat Enterprise Linux 8.2 Telecommunications Update Service | RedHat | python-reportlab-0:3.4.0-8.el8_2.1 | * |
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | RedHat | python-reportlab-0:3.4.0-8.el8_2.1 | * |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | RedHat | python-reportlab-0:3.4.0-8.el8_4.1 | * |
Red Hat Enterprise Linux 8.4 Telecommunications Update Service | RedHat | python-reportlab-0:3.4.0-8.el8_4.1 | * |
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | RedHat | python-reportlab-0:3.4.0-8.el8_4.1 | * |
Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | python-reportlab-0:3.4.0-8.el8_6.1 | * |
Python-reportlab | Ubuntu | bionic | * |
Python-reportlab | Ubuntu | trusty | * |
Python-reportlab | Ubuntu | upstream | * |
Python-reportlab | Ubuntu | xenial | * |