Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1yODdxLWZqMjUtZjhqZs4ABCrQ

Cross-site Scripting vulnerability in SimpleXLSXEx::readThemeColors, SimpleXLSXEx::getColorValue and SimpleXLSX::toHTMLEx

Impact

When calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code.

Patches

The supplied patch resolves this vulnerability for SimpleXLSX. Use 1.1.13

Workarounds

Don't use data publication via toHTMLEx


This vulnerability was discovered by Aleksey Solovev (Positive Technologies)

Permalink: https://github.com/advisories/GHSA-r87q-fj25-f8jf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yODdxLWZqMjUtZjhqZs4ABCrQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 month ago
Updated: about 1 month ago


CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

EPSS Percentage: 0.00043
EPSS Percentile: 0.10912

Identifiers: GHSA-r87q-fj25-f8jf, CVE-2024-56364
References: Repository: https://github.com/shuchkin/simplexlsx
Blast Radius: 13.7

Affected Packages

packagist:shuchkin/simplexlsx
Dependent packages: 10
Dependent repositories: 103
Downloads: 2,522,600 total
Affected Version Ranges: >= 1.0.12, < 1.1.13
Fixed in: 1.1.13
All affected versions: 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.16, 1.0.17, 1.0.18, 1.0.19, 1.0.20, 1.0.21, 1.1.10, 1.1.11, 1.1.12
All unaffected versions: 0.8.5, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.8.11, 0.8.12, 0.8.13, 0.8.14, 0.8.15, 0.8.16, 0.8.17, 0.8.18, 0.8.19, 0.8.21, 0.8.22, 0.8.23, 0.8.24, 0.8.25, 0.8.26, 0.8.27, 0.8.29, 0.8.30, 0.8.31, 0.8.32, 0.8.33, 0.9.10, 0.9.11, 1.1.13