Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command Injection in pdfkit >=0.0.0 (CVE-2022-25765) #507

Closed
denzelem opened this issue Sep 15, 2022 · 1 comment
Closed

Command Injection in pdfkit >=0.0.0 (CVE-2022-25765) #507

denzelem opened this issue Sep 15, 2022 · 1 comment

Comments

@denzelem
Copy link

Version 0.0.0 to 0.8.6, which is the most recent version of PDFKit when writing this issue, are affected by a command injection vulnerability. More details about the vulnerability can be found in https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795.

This issue might be updated by the maintainers of this project once the vulnerability is fixed and released.

Vulnerable code

def shell_safe_url
url_needs_escaping? ? URI::DEFAULT_PARSER.escape(@source) : @source
end
def url_needs_escaping?
URI::DEFAULT_PARSER.unescape(@source) == @source
end

@serene
Copy link
Contributor

serene commented Oct 2, 2022

Resolved by #509.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants