WordPress Plugin Vulnerabilities

PDF Light Viewer < 1.4.12 - Authenticated Command Injection

Description

The plugin allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.

Proof of Concept

1) Go to Import PDF.
2) Select PDF file.
3) Set compression as 60 | calc | echo
4) Toggle import (the first checkbox)
5) Publish or update
6) Command executes

Affects Plugins

Fixed in 1.4.12

References

Classification

Type
COMMAND INJECTION
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
apple502j
Submitter
apple502j
Verified
Yes

Timeline

Publicly Published
2021-09-15 (about 2 years ago)
Added
2021-09-15 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other