Remote Code Execution (RCE) Affecting reportlab2 package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
13.64% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-REPORTLAB2-473507
  • published16 Oct 2019
  • disclosed16 Oct 2019
  • creditUnknown

Introduced: 16 Oct 2019

CVE-2019-17626  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

There is no fixed version for reportlab2.

Overview

reportlab2 is a fork of reportlab with added AES-256 encryption (AESV3)

Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with <span color=" followed by arbitrary Python code.

CVSS Scores

version 3.1