Description
All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2729 | All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path. |
Github GHSA |
GHSA-fpr8-4wvx-j9q3 | node-qpdf vulnerable to command injection |
References
History
Wed, 18 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T13:35:42.463Z
Reserved: 2023-02-20T10:28:48.930Z
Link: CVE-2023-26155
Updated: 2024-08-02T11:39:06.654Z
Status : Modified
Published: 2023-10-14T05:15:55.183
Modified: 2024-11-21T07:50:53.757
Link: CVE-2023-26155
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA