Headline
GHSA-35jj-wx47-4w8r: WeasyPrint allows the attachment of arbitrary files and URLs to a PDF
Impact
Since version 61.0, there’s a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if url_fetcher
is configured to prevent access to files and URLs.
Patches
Fixed by 734ee8e that’s included in 61.2
Workarounds
- Check that no PDF attachment is defined in source HTML.
- Launch WeasyPrint in a sandbox that prevents access to the filesystem and the network.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-28184
WeasyPrint allows the attachment of arbitrary files and URLs to a PDF
High severity GitHub Reviewed Published Mar 8, 2024 in Kozea/WeasyPrint • Updated Mar 8, 2024
Package
pip weasyprint (pip)
Affected versions
>= 61.0, <= 61.1
Description
Impact
Since version 61.0, there’s a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if url_fetcher is configured to prevent access to files and URLs.
Patches
Fixed by 734ee8e that’s included in 61.2
Workarounds
- Check that no PDF attachment is defined in source HTML.
- Launch WeasyPrint in a sandbox that prevents access to the filesystem and the network.
References
- GHSA-35jj-wx47-4w8r
- Kozea/WeasyPrint@734ee8e
Published to the GitHub Advisory Database
Mar 8, 2024