Skip to content

Commit db27d7d

Browse files
committed
data/reports: add GO-2022-1184.yaml
Aliases: CVE-2022-4643 Fixes #1184 Change-Id: I1c0d8c2562d4624ab18685084c9bf91096987250 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/459315 Run-TryBot: Tim King <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent 24bc9b8 commit db27d7d

File tree

2 files changed

+93
-0
lines changed

2 files changed

+93
-0
lines changed

data/osv/GO-2022-1184.json

+67
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"id": "GO-2022-1184",
3+
"published": "0001-01-01T00:00:00Z",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"aliases": [
6+
"CVE-2022-4643"
7+
],
8+
"details": "The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads to os command injection.",
9+
"affected": [
10+
{
11+
"package": {
12+
"name": "code.sajari.com/docconv",
13+
"ecosystem": "Go"
14+
},
15+
"ranges": [
16+
{
17+
"type": "SEMVER",
18+
"events": [
19+
{
20+
"introduced": "1.1.0"
21+
},
22+
{
23+
"fixed": "1.3.5"
24+
}
25+
]
26+
}
27+
],
28+
"database_specific": {
29+
"url": "https://pkg.go.dev/vuln/GO-2022-1184"
30+
},
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "code.sajari.com/docconv",
35+
"symbols": [
36+
"Convert",
37+
"ConvertPDF",
38+
"ConvertPages",
39+
"ConvertPath",
40+
"ConvertPathReadability",
41+
"PDFHasImage"
42+
]
43+
}
44+
]
45+
}
46+
}
47+
],
48+
"references": [
49+
{
50+
"type": "FIX",
51+
"url": "https://github.com/sajari/docconv/pull/110"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://github.com/sajari/docconv/releases/tag/v1.3.5"
56+
},
57+
{
58+
"type": "FIX",
59+
"url": "https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5"
60+
},
61+
{
62+
"type": "WEB",
63+
"url": "https://vuldb.com/?id.216502"
64+
}
65+
],
66+
"schema_version": "1.3.1"
67+
}

data/reports/GO-2022-1184.yaml

+26
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
modules:
2+
- module: code.sajari.com/docconv
3+
versions:
4+
- introduced: 1.1.0
5+
fixed: 1.3.5
6+
vulnerable_at: 1.3.4
7+
packages:
8+
- package: code.sajari.com/docconv
9+
symbols:
10+
- PDFHasImage
11+
- ConvertPDF
12+
derived_symbols:
13+
- Convert
14+
- ConvertPages
15+
- ConvertPath
16+
- ConvertPathReadability
17+
description: |
18+
The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage}
19+
leads to os command injection.
20+
cves:
21+
- CVE-2022-4643
22+
references:
23+
- fix: https://github.com/sajari/docconv/pull/110
24+
- web: https://github.com/sajari/docconv/releases/tag/v1.3.5
25+
- fix: https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5
26+
- web: https://vuldb.com/?id.216502

0 commit comments

Comments
 (0)