Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mcHI4LTR3dngtajlxM84AA2cb
node-qpdf vulnerable to command injection
All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
Permalink: https://github.com/advisories/GHSA-fpr8-4wvx-j9q3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mcHI4LTR3dngtajlxM84AA2cb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 7.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Percentage: 0.00183
EPSS Percentile: 0.56519
Identifiers: GHSA-fpr8-4wvx-j9q3, CVE-2023-26155
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-26155
- https://github.com/nrhirani/node-qpdf/issues/23
- https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918
- https://github.com/advisories/GHSA-fpr8-4wvx-j9q3
Blast Radius: 7.6
Affected Packages
npm:node-qpdf
Dependent packages: 4Dependent repositories: 11
Downloads: 28,996 last month
Affected Version Ranges: <= 1.0.3
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3