An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
References
Link | Resource |
---|---|
https://github.com/spipu/html2pdf | Product Third Party Advisory |
https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md | Release Notes Third Party Advisory |
https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf | Exploit Third Party Advisory |
https://github.com/spipu/html2pdf | Product Third Party Advisory |
https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md | Release Notes Third Party Advisory |
https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/spipu/html2pdf - Product, Third Party Advisory | |
References | () https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md - Release Notes, Third Party Advisory | |
References | () https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf - Exploit, Third Party Advisory |
Information
Published : 2022-01-18 12:15
Updated : 2024-11-21 06:32
NVD link : CVE-2021-45394
Mitre link : CVE-2021-45394
CVE.ORG link : CVE-2021-45394
JSON object : View
Products Affected
html2pdf_project
- html2pdf