CVE-2024-47873

PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. The XmlScanner class has a scan method which should prevent XXE attacks. However, prior to versions 1.9.4, 2.1.3, 2.3.2, and 3.4.0, the regexes used in the `scan` method and the findCharSet method can be bypassed by using UCS-4 and encoding guessing. An attacker can bypass the sanitizer and achieve an XML external entity attack. Versions 1.9.4, 2.1.3, 2.3.2, and 3.4.0 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*
cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*
cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*
cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*

History

07 Mar 2025, 16:48

Type Values Removed Values Added
First Time Phpoffice phpspreadsheet
Phpoffice
CPE cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*
References () https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php - () https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php - Product
References () https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w - () https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w - Exploit, Vendor Advisory
References () https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing - () https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing - Not Applicable
References () https://www.w3.org/TR/xml/#sec-guessing-no-ext-info - () https://www.w3.org/TR/xml/#sec-guessing-no-ext-info - Technical Description

19 Nov 2024, 21:57

Type Values Removed Values Added
Summary
  • (es) PhpSpreadsheet es una librería PHP para leer y escribir archivos de hojas de cálculo. La clase XmlScanner tiene un método de escaneo que debería evitar ataques XXE. Sin embargo, antes de las versiones 1.9.4, 2.1.3, 2.3.2 y 3.4.0, las expresiones regulares utilizadas en el método `scan` y en el método findCharSet se pueden omitir utilizando UCS-4 y adivinando la codificación. Un atacante puede omitir el desinfectante y lograr un ataque de entidad externa XML. Las versiones 1.9.4, 2.1.3, 2.3.2 y 3.4.0 solucionan el problema.

18 Nov 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-18 17:15

Updated : 2025-03-07 16:48


NVD link : CVE-2024-47873

Mitre link : CVE-2024-47873

CVE.ORG link : CVE-2024-47873


JSON object : View

Products Affected

phpoffice

  • phpspreadsheet
CWE
CWE-611

Improper Restriction of XML External Entity Reference