First published: Mon Jul 01 2019(Updated: )
PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?<!ENTITY? and thus allowing for an xml external entity processing (XXE) attack.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpoffice/phpspreadsheet | <1.8.0 | |
Phpspreadsheet Project Phpspreadsheet | <1.8.0 | |
composer/phpoffice/phpspreadsheet | <1.8.0 | 1.8.0 |
PHPOffice PhpSpreadsheet | <1.8.0 | |
<1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12331 is an XXE vulnerability in PHPOffice PhpSpreadsheet before version 1.8.0.
CVE-2019-12331 has a severity rating of 8.8 (High).
PHPOffice PhpSpreadsheet versions before 1.8.0 are affected by CVE-2019-12331.
To fix CVE-2019-12331, update PHPOffice PhpSpreadsheet to version 1.8.0 or later.
More information about CVE-2019-12331 can be found at the following references: [GitHub Pull Request](https://github.com/PHPOffice/PhpSpreadsheet/pull/1041), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-12331), [CHANGELOG.md](https://github.com/PHPOffice/PhpSpreadsheet/blob/master/CHANGELOG.md#180---2019-07-01).