mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/mpdf/mpdf/issues/949 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T03:00:19.425Z
Reserved: 2019-01-08T00:00:00
Link: CVE-2019-1000005

No data.

Status : Modified
Published: 2019-02-04T21:29:00.800
Modified: 2024-11-21T04:17:39.433
Link: CVE-2019-1000005

No data.