Is Aspose vulnerable to CVE-2022-30190

Is Aspose vulnerable to CVE-2022-30190. Please confirm ASAP

Sandeep

@sgarg.saba,
Thank you for contacting support.

As for Aspose.Slides, I’ve added a ticket with ID SLIDESNET-43251 to our issue tracking system. Our development team will investigate your question. We will reply to you as soon as possible.

My colleagues will reply to you shortly about other Aspose products.

@sgarg.saba,
Hello.
Aspose.CAD is not vulnerable to this.

@sgarg.saba Aspose.Words is not affected by CVE-2022-30190 vulnerability. The atack is performed via executing JavaScript. Aspose.Words does not execute JavaScript.

@alexey.noskov ,

I am not sure it is related to executing JavaScript. Detonating this malicious code is as simple as opening up a Word doc—in preview mode

Regards,
Sandeep

@sgarg.saba Aspose.Imaging has not such vulnerability. Before 21.4 version there were some XXE vulnerabilities in Aspose.Imaging, but we succesfully fixed that issues.

@sgarg.saba,

Generally, Aspose APIs are not affected by CVE-2022-30190 vulnerability. Aspose APIs are not referenced to or depend upon the MSDT.

The infected file contains a link to an HTML file that contains JavaScript code that executes malicious code in the command line via MSDT. As a result of successful exploitation, the attackers can install programs, view, modify or destroy data, as well as create new accounts — that is, do anything that’s possible armed with the victim’s privileges in the system.

But, as I mentioned Aspose.Words does not execute any scripts upon loading documents.
To be more protected, you can also use IResourceLoadingCallback to skip loading external resources at all.

@sgarg.saba
Aspose.Tasks is not vulnerable to CVE-2022-30190 because it doesn’t parse\execute HTML or JavaScript when reading files.

@sgarg.saba,
As for Aspose.Slides, our development team reported that this library is also not affected by CVE-2022-30190. We don’t use MSDT and we don’t run downloaded external resources.

To prevent even downloading external resources, IResourceLoadingCallback interface can be used like this:

var options = new LoadOptions
{
    ResourceLoadingCallback = new ResourceLoadingSkip()
};

var presentation = new Presentation("example.pptx", options);
public class ResourceLoadingSkip : IResourceLoadingCallback
{
    public ResourceLoadingAction ResourceLoading(IResourceLoadingArgs args)
    {
        return ResourceLoadingAction.Skip;
    }
}

But again, this is not required, CVE-2022-30190 does not affect Aspose.Slides, because we do not execute anything during loading, export, or rendering a presentation.

@sgarg.saba
Aspose.ZIP is not affected by CVE-2022-30190 vulnerability. It does not anyhow relate MSDT.

@sgarg.saba

For Aspose.PDF for .NET, an investigation ticket as PDFNET-51895 has been logged in our issue tracking system. We will analyze the ticket and let you know once its resolved. Furthermore, Aspose.OMR, Aspose.OCR, Aspose.Diagram, Aspose.3D, Aspose.HTML, and Aspose.Page do not have this vulnerability.

Any update on this related to Aspose.PDF

@sgarg.saba

The ticket logged for Aspose.PDF for .NET has not been yet resolved. However, we will surely inform you once it is fully analyzed. Please spare us some time.