Lucene search

K
githubGitHub Advisory DatabaseGHSA-FPR8-4WVX-J9Q3
HistoryOct 14, 2023 - 6:30 a.m.

node-qpdf vulnerable to command injection

2023-10-1406:30:54
CWE-77
CWE-94
GitHub Advisory Database
github.com
50
node-qpdf
command injection
vulnerability
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

51.7%

All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.

Affected configurations

Vulners
Node
nodeqpdfRange1.0.3
VendorProductVersionCPE
nodeqpdf*cpe:2.3:a:node:qpdf:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

51.7%