CVE-2023-26155

All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nrhirani:node-qpdf:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://github.com/nrhirani/node-qpdf/issues/23 - Exploit, Issue Tracking () https://github.com/nrhirani/node-qpdf/issues/23 - Exploit, Issue Tracking
References () https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.3

18 Oct 2023, 18:44

Type Values Removed Values Added
References (MISC) https://github.com/nrhirani/node-qpdf/issues/23 - (MISC) https://github.com/nrhirani/node-qpdf/issues/23 - Exploit, Issue Tracking
References (MISC) https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - (MISC) https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 - Exploit, Third Party Advisory
First Time Nrhirani node-qpdf
Nrhirani
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-77
CPE cpe:2.3:a:nrhirani:node-qpdf:*:*:*:*:*:*:*:*

14 Oct 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-14 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26155

Mitre link : CVE-2023-26155

CVE.ORG link : CVE-2023-26155


JSON object : View

Products Affected

nrhirani

  • node-qpdf
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')