Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zNWpqLXd4NDctNHc4cs4AA52-
WeasyPrint allows the attachment of arbitrary files and URLs to a PDF
Impact
Since version 61.0, there's a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if url_fetcher
is configured to prevent access to files and URLs.
Patches
Fixed by 734ee8e that’s included in 61.2
Workarounds
- Check that no PDF attachment is defined in source HTML.
- Launch WeasyPrint in a sandbox that prevents access to the filesystem and the network.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zNWpqLXd4NDctNHc4cs4AA52-
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 9 months ago
Updated: 8 months ago
CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Identifiers: GHSA-35jj-wx47-4w8r, CVE-2024-28184
References:
- https://github.com/Kozea/WeasyPrint/security/advisories/GHSA-35jj-wx47-4w8r
- https://github.com/Kozea/WeasyPrint/commit/734ee8e2dc84ff3090682f3abff056d0907c8598
- https://nvd.nist.gov/vuln/detail/CVE-2024-28184
- https://lists.fedoraproject.org/archives/list/[email protected]/message/ZLQZMOEDY72TS43HDXOBVID2VYCTWIH6
- https://github.com/advisories/GHSA-35jj-wx47-4w8r
Blast Radius: 23.2
Affected Packages
pypi:weasyprint
Dependent packages: 114Dependent repositories: 1,344
Downloads: 2,490,590 last month
Affected Version Ranges: >= 61.0, <= 61.1
Fixed in: 61.2
All affected versions:
All unaffected versions: 0.2.1, 0.2.2, 0.3.1, 0.6.1, 0.7.1, 0.17.1, 0.19.1, 0.19.2, 0.20.1, 0.20.2, 0.42.1, 0.42.2, 0.42.3