mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
References
Link | Resource |
---|---|
https://github.com/mpdf/mpdf/issues/949 | Exploit Issue Tracking Third Party Advisory |
https://github.com/mpdf/mpdf/issues/949 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mpdf/mpdf/issues/949 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2019-02-04 21:29
Updated : 2024-11-21 04:17
NVD link : CVE-2019-1000005
Mitre link : CVE-2019-1000005
CVE.ORG link : CVE-2019-1000005
JSON object : View
Products Affected
mpdf_project
- mpdf
CWE
CWE-502
Deserialization of Untrusted Data