Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yODdxLWZqMjUtZjhqZs4ABCrQ
Cross-site Scripting vulnerability in SimpleXLSXEx::readThemeColors, SimpleXLSXEx::getColorValue and SimpleXLSX::toHTMLEx
Impact
When calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code.
Patches
The supplied patch resolves this vulnerability for SimpleXLSX. Use 1.1.13
Workarounds
Don't use data publication via toHTMLEx
This vulnerability was discovered by Aleksey Solovev (Positive Technologies)
Permalink: https://github.com/advisories/GHSA-r87q-fj25-f8jfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yODdxLWZqMjUtZjhqZs4ABCrQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 month ago
Updated: about 1 month ago
CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
EPSS Percentage: 0.00043
EPSS Percentile: 0.10912
Identifiers: GHSA-r87q-fj25-f8jf, CVE-2024-56364
References:
- https://github.com/shuchkin/simplexlsx/security/advisories/GHSA-r87q-fj25-f8jf
- https://nvd.nist.gov/vuln/detail/CVE-2024-56364
- https://github.com/shuchkin/simplexlsx/commit/71a5e3d40d14e33161f8a40b3fd02de542218ef0
- https://github.com/advisories/GHSA-r87q-fj25-f8jf
Blast Radius: 13.7
Affected Packages
packagist:shuchkin/simplexlsx
Dependent packages: 10Dependent repositories: 103
Downloads: 2,522,600 total
Affected Version Ranges: >= 1.0.12, < 1.1.13
Fixed in: 1.1.13
All affected versions: 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.16, 1.0.17, 1.0.18, 1.0.19, 1.0.20, 1.0.21, 1.1.10, 1.1.11, 1.1.12
All unaffected versions: 0.8.5, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.8.11, 0.8.12, 0.8.13, 0.8.14, 0.8.15, 0.8.16, 0.8.17, 0.8.18, 0.8.19, 0.8.21, 0.8.22, 0.8.23, 0.8.24, 0.8.25, 0.8.26, 0.8.27, 0.8.29, 0.8.30, 0.8.31, 0.8.32, 0.8.33, 0.9.10, 0.9.11, 1.1.13