CVE-2016-4991

Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.
References
Link Resource
https://lf.lc/cve/cve-2016-4991/ Exploit Third Party Advisory
https://lf.lc/cve/cve-2016-4991/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nodepdf_project:nodepdf:1.3.0:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () https://lf.lc/cve/cve-2016-4991/ - Exploit, Third Party Advisory () https://lf.lc/cve/cve-2016-4991/ - Exploit, Third Party Advisory

Information

Published : 2022-07-28 17:15

Updated : 2024-11-21 02:53


NVD link : CVE-2016-4991

Mitre link : CVE-2016-4991

CVE.ORG link : CVE-2016-4991


JSON object : View

Products Affected

nodepdf_project

  • nodepdf
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')