EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in PhpSpreadsheet, a popular PHP library for reading and writing spreadsheet files. The affected versions include v1.30.2 and potentially earlier versions. The vulnerabilities include SSRF/RCE in IOFactory::load when $filename is user controlled and CPU Denial of Service via Unbounded Row Index in SpreadsheetML XML Reader and CPU Denial of Service via Unbounded Row Number in XLSX Row Dimensions. These vulnerabilities can be exploited by attackers to gain unauthorized access to sensitive data or cause denial of service by exhausting server CPU resources. The business risk and impact of these vulnerabilities are significant, as they can be exploited remotely and may allow attackers to gain access to sensitive data or disrupt business operations.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in PhpSpreadsheet, a popular PHP library for reading and writing spreadsheet files. The affected versions include v1.30.2 and potentially earlier versions. The vulnerabilities include SSRF/RCE in IOFactory::load when $filename is user controlled and CPU Denial of Service via Unbounded Row Index in SpreadsheetML XML Reader and CPU Denial of Service via Unbounded Row Number in XLSX Row Dimensions. These vulnerabilities can be exploited by attackers to gain unauthorized access to sensitive data or cause denial of service by exhausting server CPU resources. The business risk and impact of these vulnerabilities are significant, as they can be exploited remotely and may allow attackers to gain access to sensitive data or disrupt business operations.[emaillocker id="1283"]
The overall risk and urgency of these vulnerabilities are high, as they can be exploited remotely and may allow attackers to gain access to sensitive data or disrupt business operations. If exploited, these vulnerabilities can have significant business consequences, including data breaches, financial losses, and reputational damage.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-q4q6-r8wh-5cgh
https://github.com/advisories/GHSA-84wq-86v6-x5j6
https://github.com/advisories/GHSA-7c6m-4442-2x6m