eramba through c2.8.1 allows HTTP Host header injection with (for example) resultant wkhtml2pdf PDF printing by authenticated users.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://discussions.eramba.org/t/bug-injectable-host-header-security-issue/1719 | vendor advisory |
https://www.eramba.org/releases | release notes vendor advisory |