All the vulnerabilites related to Kozea - CairoSVG
cve-2021-21236
Vulnerability from cvelistv5
Published
2021-01-06 17:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf | x_refsource_CONFIRM | |
https://pypi.org/project/CairoSVG/ | x_refsource_MISC | |
https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3 | x_refsource_MISC | |
https://github.com/Kozea/CairoSVG/releases/tag/2.5.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pypi.org/project/CairoSVG/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/releases/tag/2.5.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CairoSVG", "vendor": "Kozea", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T17:00:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pypi.org/project/CairoSVG/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kozea/CairoSVG/releases/tag/2.5.1" } ], "source": { "advisory": "GHSA-hq37-853p-g5cf", "discovery": "UNKNOWN" }, "title": "Regular Expression Denial of Service in CairoSVG", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21236", "STATE": "PUBLIC", "TITLE": "Regular Expression Denial of Service in CairoSVG" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CairoSVG", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "Kozea" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf", "refsource": "CONFIRM", "url": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf" }, { "name": "https://pypi.org/project/CairoSVG/", "refsource": "MISC", "url": "https://pypi.org/project/CairoSVG/" }, { "name": "https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3", "refsource": "MISC", "url": "https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3" }, { "name": "https://github.com/Kozea/CairoSVG/releases/tag/2.5.1", "refsource": "MISC", "url": "https://github.com/Kozea/CairoSVG/releases/tag/2.5.1" } ] }, "source": { "advisory": "GHSA-hq37-853p-g5cf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21236", "datePublished": "2021-01-06T17:00:19", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-27586
Vulnerability from cvelistv5
Published
2023-03-20 15:23
Modified
2024-08-02 12:16
Severity ?
EPSS score ?
Summary
CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to version 2.7.0, Cairo can send requests to external hosts when processing SVG files. A malicious actor could send a specially crafted SVG file that allows them to perform a server-side request forgery or denial of service. Version 2.7.0 disables CairoSVG's ability to access other files online by default.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv | x_refsource_CONFIRM | |
https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255 | x_refsource_MISC | |
https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53 | x_refsource_MISC | |
https://github.com/Kozea/CairoSVG/releases/tag/2.7.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:36.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv" }, { "name": "https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255" }, { "name": "https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53" }, { "name": "https://github.com/Kozea/CairoSVG/releases/tag/2.7.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kozea/CairoSVG/releases/tag/2.7.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CairoSVG", "vendor": "Kozea", "versions": [ { "status": "affected", "version": "\u003c 2.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to version 2.7.0, Cairo can send requests to external hosts when processing SVG files. A malicious actor could send a specially crafted SVG file that allows them to perform a server-side request forgery or denial of service. Version 2.7.0 disables CairoSVG\u0027s ability to access other files online by default." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-20T15:23:31.106Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv" }, { "name": "https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255" }, { "name": "https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53" }, { "name": "https://github.com/Kozea/CairoSVG/releases/tag/2.7.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kozea/CairoSVG/releases/tag/2.7.0" } ], "source": { "advisory": "GHSA-rwmf-w63j-p7gv", "discovery": "UNKNOWN" }, "title": "CairoSVG improperly processes SVG files loaded from external resources" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-27586", "datePublished": "2023-03-20T15:23:31.106Z", "dateReserved": "2023-03-04T01:03:53.634Z", "dateUpdated": "2024-08-02T12:16:36.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }