CVE-2018-19277

Published: Nov 14, 2018 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2019-0766 Aliases: GHSA-xcrg-29h7-h4cj
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0315
Percentile
0,9th
Updated

EPSS Score Trend (Last 91 Days)

91

XML Injection (aka Blind XPath Injection)

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Read Application Data Modify Application Data
Applicable Platforms
All platforms may be affected
View CWE Details
Exploit

PhpSpreadsheet < 1.5.0 - XML External Entity (XXE)

PhpSpreadsheet < 1.5.0 - XML External Entity (XXE)

View Exploit Code →
Application

Phpspreadsheet by Phpoffice

Version Range Affected
To 1.5.0 (inclusive)
cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/MewesK/TwigSpreadsheetBundle/issues/18
https://github.com/PHPOffice/PhpSpreadsheet/issues/771
https://www.bishopfox.com/news/2018/11/phpoffice-versions/
https://www.drupal.org/sa-contrib-2021-043
https://github.com/MewesK/TwigSpreadsheetBundle/issues/18
https://github.com/PHPOffice/PhpSpreadsheet/issues/771
https://www.bishopfox.com/news/2018/11/phpoffice-versions/
https://www.drupal.org/sa-contrib-2021-043