reportlab@3.5.9 vulnerabilities
The Reportlab Toolkit
-
latest version
4.2.5
-
latest non vulnerable version
-
first published
16 years ago
-
latest version published
2 months ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the reportlab package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
reportlab is a Python library for generating PDFs and graphics. Affected versions of this package are vulnerable to Arbitrary Code Execution via the Note: This is only exploitable if the attacker uses a crafted malicious html 'unichar' tag input and then uses the feature to generate a pdf of the document. How to fix Arbitrary Code Execution? Upgrade |
[,3.5.31)
|
reportlab is a Python library for generating PDFs and graphics. Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to insufficient checks in the ‘rl_safe_eval’ function. Attackers can inject malicious code into an HTML file that will later be converted to PDF using software that relies on the ReportLab library. To exploit the vulnerability, the entire malicious code must be executed with Note: This exploit is possible only if users allow hostile input to be passed into How to fix Remote Code Execution (RCE)? Upgrade |
[,3.6.13)
|
reportlab is a Python library for generating PDFs and graphics. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via Steps to reproduce by Karan Bamal:
How to fix Server-side Request Forgery (SSRF)? Upgrade |
[0,3.5.55)
|
reportlab is a Python library for generating PDFs and graphics. Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to How to fix Remote Code Execution (RCE)? Upgrade |
[0,3.5.34)
|