All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
References
Link | Resource |
---|---|
https://github.com/nrhirani/node-qpdf/issues/23 | Exploit Issue Tracking |
https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 | Exploit Third Party Advisory |
https://github.com/nrhirani/node-qpdf/issues/23 | Exploit Issue Tracking |
https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nrhirani/node-qpdf/issues/23 - Exploit, Issue Tracking | |
References | () https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
18 Oct 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/nrhirani/node-qpdf/issues/23 - Exploit, Issue Tracking | |
References | (MISC) https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - Exploit, Third Party Advisory | |
First Time |
Nrhirani node-qpdf
Nrhirani |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-77 | |
CPE | cpe:2.3:a:nrhirani:node-qpdf:*:*:*:*:*:*:*:* |
14 Oct 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-14 05:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26155
Mitre link : CVE-2023-26155
CVE.ORG link : CVE-2023-26155
JSON object : View
Products Affected
nrhirani
- node-qpdf