Safety vulnerability ID: 37572
The information on this page was manually curated by our Cybersecurity Intelligence Team.
ReportLab 3.5.34 includes a fix for CVE-2019-17626: Remote code execution vulnerability because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
Latest version: 4.2.5
The Reportlab Toolkit
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
MISC:https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code: https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code
MISC:https://bitbucket.org/rptlab/reportlab/src/default/CHANGES.md: https://bitbucket.org/rptlab/reportlab/src/default/CHANGES.md
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application