pacparserfindproxy in Pacparser before 1.4.2 allows JavaScript injection, and possibly privilege escalation, when the attacker controls the URL (which may be realistic within enterprise security products).
{
"binaries": [
{
"binary_name": "libpacparser-dev",
"binary_version": "1.3.6-1.1build1"
},
{
"binary_name": "libpacparser1",
"binary_version": "1.3.6-1.1build1"
},
{
"binary_name": "python-pacparser",
"binary_version": "1.3.6-1.1build1"
},
{
"binary_name": "python3-pacparser",
"binary_version": "1.3.6-1.1build1"
}
]
}
{
"binaries": [
{
"binary_name": "libpacparser-dev",
"binary_version": "1.3.6-1.1build3"
},
{
"binary_name": "libpacparser1",
"binary_version": "1.3.6-1.1build3"
},
{
"binary_name": "python-pacparser",
"binary_version": "1.3.6-1.1build3"
},
{
"binary_name": "python3-pacparser",
"binary_version": "1.3.6-1.1build3"
}
]
}