Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zY3djLW03YzItcXI4Ns4AAUM2
mPDF Unsafe Deserialization
mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">
. This vulnerability appears to have been fixed in 7.1.8.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zY3djLW03YzItcXI4Ns4AAUM2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 8 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-3cwc-m7c2-qr86, CVE-2019-1000005
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-1000005
- https://github.com/mpdf/mpdf/issues/949
- https://github.com/advisories/GHSA-3cwc-m7c2-qr86
Blast Radius: 33.4
Affected Packages
packagist:mpdf/mpdf
Dependent packages: 455Dependent repositories: 6,279
Downloads: 47,329,972 total
Affected Version Ranges: <= 7.1.7
Fixed in: 7.1.8
All affected versions: 5.5.1, 5.6.1, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 6.0.0, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7
All unaffected versions: 7.1.8, 7.1.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 8.0.17, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.2.0, 8.2.1, 8.2.2, 8.2.3