Vulnerability Description
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Reportlab | Reportlab | <= 3.5.26 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00002.html
- https://access.redhat.com/errata/RHSA-2020:0195
- https://access.redhat.com/errata/RHSA-2020:0197
- https://access.redhat.com/errata/RHSA-2020:0201
- https://access.redhat.com/errata/RHSA-2020:0230
- https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remoExploitIssue TrackingThird Party Advisory
- https://bitbucket.org/rptlab/reportlab/src/default/CHANGES.mdRelease NotesThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202007-35
- https://security.netapp.com/advisory/ntap-20240719-0006/
- https://usn.ubuntu.com/4273-1/
- https://www.debian.org/security/2020/dsa-4663
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00002.html
FAQ
What is CVE-2019-17626?
CVE-2019-17626 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
How severe is CVE-2019-17626?
CVE-2019-17626 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17626?
Check the references section above for vendor advisories and patch information. Affected products include: Reportlab Reportlab.