CVE-2019-1000005
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
mPDF, en versiones 7.1.7 y anteriores, contiene una vulnerabilidad CWE-502: deserialización de datos no fiables en el método getImage() de la clase Image/ImageProcessor que puede resultar en la ejecución de código arbitrario, la escritura en archivos, etc. Este ataque parece ser explotable si un atacante aloja una imagen manipulada en el servidor de la víctima y desencadena la generación de un archivo PDF con contenido <img src="phar://path/to/crafted/image">. La vulnerabilidad parece haber sido solucionada en la versión 7.1.8.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-08 CVE Reserved
- 2019-02-04 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/mpdf/mpdf/issues/949 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mpdf Project Search vendor "Mpdf Project" | Mpdf Search vendor "Mpdf Project" for product "Mpdf" | <= 7.1.7 Search vendor "Mpdf Project" for product "Mpdf" and version " <= 7.1.7" | - |
Affected
|