Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial project skeleton xhtml2pdf #12266

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

ennamarie19
Copy link
Contributor

xhtml2pdf is a HTML to PDF converter using Python, the ReportLab Toolkit, html5lib and pypdf. The main benefit of this tool is that a user with web skills like HTML and CSS is able to generate PDF templates very quickly without learning new technologies. 15,713 repositories depend on xhtml2pdf, most notably maigret (9.9k+ stars), rst2pdf, aequitas, tendenci and django-easy-pdf. This is a security critical repository because people use this repository to convert html to pdf. For example, a bad actor could insert malicious code into the codebase that inserts macros into every generated pdf file. Further, this repo should be continuously fuzzed for bugs and vulnerabilities so that these dependent 15k repositories are put at less of a risk.

Copy link

ennamarie19 is integrating a new project:
- Main repo: https://github.com/xhtml2pdf/xhtml2pdf.git
- Criticality score: 0.60544

@ennamarie19
Copy link
Contributor Author

Received approval from upstream project maintainers here: xhtml2pdf/xhtml2pdf#762

@DonggeLiu Is this a repo you guys would support?

@DonggeLiu
Copy link
Contributor

@DonggeLiu Is this a repo you guys would support?

Thanks, @ennamarie19! Let me send this to the panel.

For example, a bad actor could insert malicious code into the codebase that inserts macros into every generated pdf file.

Just a minor note: I am unsure if fuzzing is designed for or can easily detect malicious code directly. If the package uses C/C++ extensions, fuzzing can detect memory corruption, which may be exploited to do so. Otherwise, fuzzing can check if the project crashes on certain inputs.

@ennamarie19
Copy link
Contributor Author

ennamarie19 commented Sep 3, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants