XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue
High severity
GitHub Reviewed
Published
Nov 20, 2019
to the GitHub Advisory Database
•
Updated Sep 4, 2024
Description
Published by the National Vulnerability Database
Nov 7, 2019
Reviewed
Nov 19, 2019
Published to the GitHub Advisory Database
Nov 20, 2019
Last updated
Sep 4, 2024
PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?<!ENTITY? and thus allowing for an xml external entity processing (XXE) attack.
References