Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTI3cDUtN2N3Ni1tNDVo
Server-Side Request Forgery in unoconv
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
Permalink: https://github.com/advisories/GHSA-27p5-7cw6-m45hJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTI3cDUtN2N3Ni1tNDVo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 5 years ago
Updated: about 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.00496
EPSS Percentile: 0.76005
Identifiers: GHSA-27p5-7cw6-m45h, CVE-2019-17400
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-17400
- https://github.com/unoconv/unoconv/pull/510
- https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions
- https://github.com/advisories/GHSA-27p5-7cw6-m45h
- https://github.com/pypa/advisory-database/tree/main/vulns/unoconv/PYSEC-2019-213.yaml
Blast Radius: 11.0
Affected Packages
pypi:unoconv
Dependent packages: 5Dependent repositories: 29
Downloads: 31,834 last month
Affected Version Ranges: < 0.9.0
Fixed in: 0.9.0
All affected versions: 0.8.2
All unaffected versions: 0.9.0