python-reportlab: CVE-2019-17626: remote code execution in colors.py

Related Vulnerabilities: CVE-2019-17626  

Debian Bug report logs - #942763
python-reportlab: CVE-2019-17626: remote code execution in colors.py

version graph

Reported by: Hugo Lefeuvre <hle@debian.org>

Date: Mon, 21 Oct 2019 08:30:02 UTC

Severity: important

Tags: security, upstream

Found in versions python-reportlab/3.1.8-3+deb8u1, python-reportlab/3.5.28-1, python-reportlab/3.5.23-1, python-reportlab/3.5.13-1, python-reportlab/3.3.0-2

Forwarded to https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Matthias Klose <doko@debian.org>:
Bug#942763; Package src:python-reportlab. (Mon, 21 Oct 2019 08:30:05 GMT) (full text, mbox, link).


Acknowledgement sent to Hugo Lefeuvre <hle@debian.org>:
New Bug report received and forwarded. Copy sent to Matthias Klose <doko@debian.org>. (Mon, 21 Oct 2019 08:30:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Hugo Lefeuvre <hle@debian.org>
To: submit@bugs.debian.org
Subject: python-reportlab: CVE-2019-17626: remote code execution in colors.py
Date: Mon, 21 Oct 2019 10:20:37 +0200
[Message part 1 (text/plain, inline)]
Source: python-reportlab
Version: 3.5.28-1
Severity: important
Tags: security upstream
Forwarded: https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code

Hi,

python-reportlab is affected by the following vulnerability:

CVE-2019-17626[0]: "ReportLab through 3.5.26 allows remote code execution
because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted
XML document with '<span color="' followed by arbitrary Python code."

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-17626

regards,
Hugo

-- 
                Hugo Lefeuvre (hle)    |    www.owl.eu.com
RSA4096_ 360B 03B3 BF27 4F4D 7A3F D5E8 14AA 1EB8 A247 3DFD
ed25519_ 37B2 6D38 0B25 B8A2 6B9F 3A65 A36F 5357 5F2D DC4C

[signature.asc (application/pgp-signature, inline)]

Marked as found in versions python-reportlab/3.5.23-1. Request was from Hugo Lefeuvre <hle@debian.org> to control@bugs.debian.org. (Mon, 21 Oct 2019 08:45:03 GMT) (full text, mbox, link).


Marked as found in versions python-reportlab/3.5.13-1. Request was from Hugo Lefeuvre <hle@debian.org> to control@bugs.debian.org. (Mon, 21 Oct 2019 08:45:04 GMT) (full text, mbox, link).


Marked as found in versions python-reportlab/3.3.0-2. Request was from Hugo Lefeuvre <hle@debian.org> to control@bugs.debian.org. (Mon, 21 Oct 2019 08:45:04 GMT) (full text, mbox, link).


Marked as found in versions python-reportlab/3.1.8-3+deb8u1. Request was from Hugo Lefeuvre <hle@debian.org> to control@bugs.debian.org. (Mon, 21 Oct 2019 08:45:05 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Oct 21 16:47:59 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.