mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/mpdf/mpdf/issues/949 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T03:00:19.425Z
Reserved: 2019-01-08T00:00:00
Link: CVE-2019-1000005

No data.

Status : Modified
Published: 2019-02-04T21:29:00.800
Modified: 2024-11-21T04:17:39.433
Link: CVE-2019-1000005

No data.

No data.