An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the /pdf endpoint. NOTE: this is disputed because the behavior of the /pdf endpoint is intentional. The /pdf endpoint is only available after installing a test framework (that lives outside of the pdfmake applicaton). Anyone installing this is responsible for ensuring that it is only available to authorized testers.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md | broken link |
https://www.youtube.com/watch?v=QcOlrWUGo6o | exploit |
https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 | third party advisory exploit |
https://github.com/bpampuch/pdfmake/issues/2702 | issue tracking |