File tree 2 files changed +93
-0
lines changed
2 files changed +93
-0
lines changed Original file line number Diff line number Diff line change
1
+ {
2
+ "id" : " GO-2022-1184" ,
3
+ "published" : " 0001-01-01T00:00:00Z" ,
4
+ "modified" : " 0001-01-01T00:00:00Z" ,
5
+ "aliases" : [
6
+ " CVE-2022-4643"
7
+ ],
8
+ "details" : " The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads to os command injection." ,
9
+ "affected" : [
10
+ {
11
+ "package" : {
12
+ "name" : " code.sajari.com/docconv" ,
13
+ "ecosystem" : " Go"
14
+ },
15
+ "ranges" : [
16
+ {
17
+ "type" : " SEMVER" ,
18
+ "events" : [
19
+ {
20
+ "introduced" : " 1.1.0"
21
+ },
22
+ {
23
+ "fixed" : " 1.3.5"
24
+ }
25
+ ]
26
+ }
27
+ ],
28
+ "database_specific" : {
29
+ "url" : " https://pkg.go.dev/vuln/GO-2022-1184"
30
+ },
31
+ "ecosystem_specific" : {
32
+ "imports" : [
33
+ {
34
+ "path" : " code.sajari.com/docconv" ,
35
+ "symbols" : [
36
+ " Convert" ,
37
+ " ConvertPDF" ,
38
+ " ConvertPages" ,
39
+ " ConvertPath" ,
40
+ " ConvertPathReadability" ,
41
+ " PDFHasImage"
42
+ ]
43
+ }
44
+ ]
45
+ }
46
+ }
47
+ ],
48
+ "references" : [
49
+ {
50
+ "type" : " FIX" ,
51
+ "url" : " https://github.com/sajari/docconv/pull/110"
52
+ },
53
+ {
54
+ "type" : " WEB" ,
55
+ "url" : " https://github.com/sajari/docconv/releases/tag/v1.3.5"
56
+ },
57
+ {
58
+ "type" : " FIX" ,
59
+ "url" : " https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5"
60
+ },
61
+ {
62
+ "type" : " WEB" ,
63
+ "url" : " https://vuldb.com/?id.216502"
64
+ }
65
+ ],
66
+ "schema_version" : " 1.3.1"
67
+ }
Original file line number Diff line number Diff line change
1
+ modules :
2
+ - module : code.sajari.com/docconv
3
+ versions :
4
+ - introduced : 1.1.0
5
+ fixed : 1.3.5
6
+ vulnerable_at : 1.3.4
7
+ packages :
8
+ - package : code.sajari.com/docconv
9
+ symbols :
10
+ - PDFHasImage
11
+ - ConvertPDF
12
+ derived_symbols :
13
+ - Convert
14
+ - ConvertPages
15
+ - ConvertPath
16
+ - ConvertPathReadability
17
+ description : |
18
+ The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage}
19
+ leads to os command injection.
20
+ cves :
21
+ - CVE-2022-4643
22
+ references :
23
+ - fix : https://github.com/sajari/docconv/pull/110
24
+ - web : https://github.com/sajari/docconv/releases/tag/v1.3.5
25
+ - fix : https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5
26
+ - web : https://vuldb.com/?id.216502
You can’t perform that action at this time.
0 commit comments