|Number of vulnerabilities||1|
|Public exploit||Public exploit code for vulnerability #1 is available.|
Client/Desktop applications / Office applications
This security bulletin contains one high risk vulnerability.
CWE-91 - XML Injection
Exploit availability: NoDescription
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the affected software does not properly handle user-supplied XML files within the "toColor(eval(arg))" in colors.py. A remote unauthenticated attacker can execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
<myroot> <label>hello-world</label> <row1> <html> <span color="open('/tmp/colors_poc.txt','wb').write('hello world!')">abcdef</span> </html> </row1> </myroot>Mitigation
Install updates from vendor's website.Vulnerable software versions
ReportLab: 1.20 - 3.5.26
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.