Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.
References
Link | Resource |
---|---|
https://lf.lc/cve/cve-2016-4991/ | Exploit Third Party Advisory |
https://lf.lc/cve/cve-2016-4991/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://lf.lc/cve/cve-2016-4991/ - Exploit, Third Party Advisory |
Information
Published : 2022-07-28 17:15
Updated : 2024-11-21 02:53
NVD link : CVE-2016-4991
Mitre link : CVE-2016-4991
CVE.ORG link : CVE-2016-4991
JSON object : View
Products Affected
nodepdf_project
- nodepdf
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')