The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
References
Link | Resource |
---|---|
https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ | Exploit Third Party Advisory |
https://github.com/unoconv/unoconv/pull/510 | Patch Third Party Advisory |
https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ | Exploit Third Party Advisory |
https://github.com/unoconv/unoconv/pull/510 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ - Exploit, Third Party Advisory | |
References | () https://github.com/unoconv/unoconv/pull/510 - Patch, Third Party Advisory |
Information
Published : 2019-10-21 23:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17400
Mitre link : CVE-2019-17400
CVE.ORG link : CVE-2019-17400
JSON object : View
Products Affected
universal_office_converter_project
- universal_office_converter
CWE
CWE-918
Server-Side Request Forgery (SSRF)