mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
References
Link | Resource |
---|---|
https://github.com/mpdf/mpdf/issues/949 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-02-04T21:00:00
Updated: 2019-02-04T20:57:01
Reserved: 2019-01-08T00:00:00
Link: CVE-2019-1000005
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-02-04T21:29:00.800
Modified: 2019-02-14T20:06:31.353
Link: CVE-2019-1000005
JSON object: View
Redhat Information
No data.
CWE