Skip to content

PyPDF2-1.26.0.tar.gz: 2 vulnerabilities (highest severity is: 6.9) #27

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - PyPDF2-1.26.0.tar.gz

PDF toolkit

Library home page: https://files.pythonhosted.org/packages/b4/01/68fcc0d43daf4c6bdbc6b33cc3f77bda531c86b174cac56ef0ffdb96faab/PyPDF2-1.26.0.tar.gz

Path to dependency file: /projects/Merge_pdfs/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20251030095957_HCLNBG/python_SCTRXI/202510301011491/env/lib/python3.9/site-packages/pypdf2-1.26.0.dist-info

Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (PyPDF2 version) Remediation Possible**
CVE-2023-36810 Medium 6.9 PyPDF2-1.26.0.tar.gz Direct PyPDF2 - 1.27.9
CVE-2022-24859 Medium 6.9 PyPDF2-1.26.0.tar.gz Direct PyPDF2 - 1.27.5

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-36810

Vulnerable Library - PyPDF2-1.26.0.tar.gz

PDF toolkit

Library home page: https://files.pythonhosted.org/packages/b4/01/68fcc0d43daf4c6bdbc6b33cc3f77bda531c86b174cac56ef0ffdb96faab/PyPDF2-1.26.0.tar.gz

Path to dependency file: /projects/Merge_pdfs/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20251030095957_HCLNBG/python_SCTRXI/202510301011491/env/lib/python3.9/site-packages/pypdf2-1.26.0.dist-info

Dependency Hierarchy:

  • PyPDF2-1.26.0.tar.gz (Vulnerable Library)

Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061

Found in base branch: master

Vulnerability Details

pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2023-06-30

URL: CVE-2023-36810

CVSS 4 Score Details (6.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-jrm6-h9cq-8gqw

Release Date: 2023-06-30

Fix Resolution: PyPDF2 - 1.27.9

CVE-2022-24859

Vulnerable Library - PyPDF2-1.26.0.tar.gz

PDF toolkit

Library home page: https://files.pythonhosted.org/packages/b4/01/68fcc0d43daf4c6bdbc6b33cc3f77bda531c86b174cac56ef0ffdb96faab/PyPDF2-1.26.0.tar.gz

Path to dependency file: /projects/Merge_pdfs/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20251030095957_HCLNBG/python_SCTRXI/202510301011491/env/lib/python3.9/site-packages/pypdf2-1.26.0.dist-info

Dependency Hierarchy:

  • PyPDF2-1.26.0.tar.gz (Vulnerable Library)

Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061

Found in base branch: master

Vulnerability Details

PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in "ContentStream._readInlineImage" only terminates when it finds the "EI" token, but never actually checks if the stream has already ended. This issue has been resolved in version "1.27.5". Users unable to upgrade should validate and PDFs prior to iterating over their content stream.

Publish Date: 2022-04-18

URL: CVE-2022-24859

CVSS 4 Score Details (6.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xcjx-m2pj-8g79

Release Date: 2022-04-18

Fix Resolution: PyPDF2 - 1.27.5

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions