WordPress Plugin Vulnerabilities
PDF Light Viewer < 1.4.12 - Authenticated Command Injection
Description
The plugin allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.
Proof of Concept
1) Go to Import PDF. 2) Select PDF file. 3) Set compression as 60 | calc | echo 4) Toggle import (the first checkbox) 5) Publish or update 6) Command executes
Affects Plugins
References
CVE
Classification
Type
COMMAND INJECTION
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
apple502j
Submitter
apple502j
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-09-15 (about 2 years ago)
Added
2021-09-15 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)