iTextPDF in iText 7 and up to (excluding 4.4.13.3) 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.
References
Link | Resource |
---|---|
https://github.com/itext/itext7/releases/tag/7.1.17 | Release Notes Third Party Advisory |
https://github.com/itext/itextpdf/releases/tag/5.5.13.3 | |
https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html | Mailing List Third Party Advisory |
https://pastebin.com/BXnkY9YY | Exploit Third Party Advisory |
https://www.debian.org/security/2023/dsa-5323 | Third Party Advisory |
https://github.com/itext/itext7/releases/tag/7.1.17 | Release Notes Third Party Advisory |
https://github.com/itext/itextpdf/releases/tag/5.5.13.3 | |
https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html | Mailing List Third Party Advisory |
https://pastebin.com/BXnkY9YY | Exploit Third Party Advisory |
https://www.debian.org/security/2023/dsa-5323 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/itext/itext7/releases/tag/7.1.17 - Release Notes, Third Party Advisory | |
References | () https://github.com/itext/itextpdf/releases/tag/5.5.13.3 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html - Mailing List, Third Party Advisory | |
References | () https://pastebin.com/BXnkY9YY - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5323 - Third Party Advisory |
Information
Published : 2021-12-15 07:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43113
Mitre link : CVE-2021-43113
CVE.ORG link : CVE-2021-43113
JSON object : View
Products Affected
itextpdf
- itext
debian
- debian_linux
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')