When the XML is read from the codes in the PDF and parsed...
Moderate severity
Unreviewed
Published
Oct 14, 2024
to the GitHub Advisory Database
•
Updated Oct 14, 2024
Description
Published by the National Vulnerability Database
Oct 14, 2024
Published to the GitHub Advisory Database
Oct 14, 2024
Last updated
Oct 14, 2024
When the XML is read from the codes in the PDF and parsed using a DocumentBuilder, the default settings of the DocumentBuilder allow for an XXE (XML External Entity) attack. Further information on this can be found on the website of the Open Worldwide Application Security Project (OWASP). An attacker could theoretically leverage this by delivering a manipulated PDF file to the target, and depending on the environment, various actions can be executed. These actions include:
References