Description
The plugin allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.
### PoC
1) Go to Import PDF. 2) Select PDF file. 3) Set compression as 60 | calc | echo 4) Toggle import (the first checkbox) 5) Publish or update 6) Command executes
Affected Software
Related
{"id": "WPVDB-ID:B5295BF9-8CF6-416E-B215-074742A5FC63", "vendorId": null, "type": "wpvulndb", "bulletinFamily": "software", "title": "PDF Light Viewer < 1.4.12 - Authenticated Command Injection", "description": "The plugin allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.\n\n### PoC\n\n1) Go to Import PDF. 2) Select PDF file. 3) Set compression as 60 | calc | echo 4) Toggle import (the first checkbox) 5) Publish or update 6) Command executes\n", "published": "2021-09-15T00:00:00", "modified": "2021-09-20T09:54:34", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://wpscan.com/vulnerability/b5295bf9-8cf6-416e-b215-074742a5fc63", "reporter": "apple502j", "references": [], "cvelist": ["CVE-2021-24684"], "immutableFields": [], "lastseen": "2021-11-26T19:29:56", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24684"]}, {"type": "patchstack", "idList": ["PATCHSTACK:02090713B971005ACE7FE8ED3734E6CF"]}, {"type": "wpexploit", "idList": ["WPEX-ID:B5295BF9-8CF6-416E-B215-074742A5FC63"]}]}, "score": {"value": 4.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24684"]}, {"type": "wpexploit", "idList": ["WPEX-ID:B5295BF9-8CF6-416E-B215-074742A5FC63"]}]}, "exploitation": null, "vulnersScore": 4.3}, "affectedSoftware": [{"version": "1.4.12", "operator": "lt", "name": "pdf-light-viewer"}], "exploit": "1) Go to Import PDF.\r\n2) Select PDF file.\r\n3) Set compression as 60 | calc | echo\r\n4) Toggle import (the first checkbox)\r\n5) Publish or update\r\n6) Command executes", "sourceData": "", "generation": 0, "_state": {"dependencies": 1660004461, "score": 1660007483}, "_internal": {"score_hash": "120ca267969cc67db88f21bb93686bcd"}}
{"patchstack": [{"lastseen": "2022-06-01T19:30:18", "description": "Authenticated Command Injection vulnerability discovered by apple502j in WordPress PDF Light Viewer plugin (versions <= 1.4.11).\n\n## Solution\n\n\r\n Update the WordPress PDF Light Viewer plugin to the latest available version (at least 1.4.12).\r\n ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-09-15T00:00:00", "type": "patchstack", "title": "WordPress PDF Light Viewer plugin <= 1.4.11 - Authenticated Command Injection vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24684"], "modified": "2021-09-15T00:00:00", "id": "PATCHSTACK:02090713B971005ACE7FE8ED3734E6CF", "href": "https://patchstack.com/database/vulnerability/pdf-light-viewer/wordpress-pdf-light-viewer-plugin-1-4-11-authenticated-command-injection-vulnerability", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T15:01:22", "description": "The WordPress PDF Light Viewer Plugin WordPress plugin before 1.4.12 allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-18T14:15:00", "type": "cve", "title": "CVE-2021-24684", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24684"], "modified": "2021-11-04T12:52:00", "cpe": [], "id": "CVE-2021-24684", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24684", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": []}], "wpexploit": [{"lastseen": "2021-11-26T19:29:56", "description": "The plugin allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-09-15T00:00:00", "type": "wpexploit", "title": "PDF Light Viewer < 1.4.12 - Authenticated Command Injection", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24684"], "modified": "2021-09-20T09:54:34", "id": "WPEX-ID:B5295BF9-8CF6-416E-B215-074742A5FC63", "href": "", "sourceData": "1) Go to Import PDF.\r\n2) Select PDF file.\r\n3) Set compression as 60 | calc | echo\r\n4) Toggle import (the first checkbox)\r\n5) Publish or update\r\n6) Command executes", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}]}