René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

107 lines
3.6 KiB
JSON

{
"id": "CVE-2019-1000005",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-02-04T21:29:00.800",
"lastModified": "2019-02-14T20:06:31.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src=\"phar://path/to/crafted/image\">. This vulnerability appears to have been fixed in 7.1.8."
},
{
"lang": "es",
"value": "mPDF, en versiones 7.1.7 y anteriores, contiene una vulnerabilidad CWE-502: deserializaci\u00f3n de datos no fiables en el m\u00e9todo getImage() de la clase Image/ImageProcessor que puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario, la escritura en archivos, etc. Este ataque parece ser explotable si un atacante aloja una imagen manipulada en el servidor de la v\u00edctima y desencadena la generaci\u00f3n de un archivo PDF con contenido <img src=\"phar://path/to/crafted/image\">. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 7.1.8."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mpdf_project:mpdf:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.1.7",
"matchCriteriaId": "FABEB918-51F7-484C-84DC-75560F640114"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mpdf/mpdf/issues/949",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}