Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:FOSSAR:TCPDF-PARSER:CVE-2018-17057
HistoryJan 01, 1970 - 12:00 a.m.

Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.

1970-01-0100:00:00
OpenJS Foundation
github.com
3

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.267

Percentile

96.8%

There was a problem hiding this comment. Choose a reason for hiding this comment The reason will be displayed to describe this comment to others. Learn more. Choose a reason Spam Abuse Off Topic Outdated Duplicate Resolved Hide comment I’m afraid this change is wrong. file_exists() is not the only method vulnerable for this kind of attack. It is also the getimagesize() call in line 6856, which can now be exploited again due to your deletions of lines 6848 to 6856 (my fix from #94).

Affected configurations

Vulners
Node
fossartcpdf_parserRange<6.2.22
VendorProductVersionCPE
fossartcpdf_parser*cpe:2.3:a:fossar:tcpdf_parser:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.267

Percentile

96.8%