First published: Fri Sep 14 2018(Updated: )
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the `phar://` wrapper.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/fooman/tcpdf | <6.2.22 | |
composer/fossar/tcpdf-parser | <6.2.22 | |
composer/la-haute-societe/tcpdf | <6.2.22 | |
composer/spoonity/tcpdf | <6.2.22 | |
composer/wallabag/tcpdf | <6.2.22 | |
composer/tecnickcom/tcpdf | <6.2.22 | |
Tecnick Tcpdf | <6.2.22 | |
Limesurvey Limesurvey | <3.16.0 | |
composer/spoonity/tcpdf | <6.2.22 | 6.2.22 |
composer/la-haute-societe/tcpdf | <6.2.22 | 6.2.22 |
composer/fooman/tcpdf | <6.2.22 | 6.2.22 |
composer/tecnickcom/tcpdf | <6.2.22 | 6.2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17057 is a vulnerability in TCPDF versions up to and excluding 6.2.22 that allows attackers to trigger deserialization of arbitrary data using the phar:// wrapper.
CVE-2018-17057 has a severity rating of 9.8 (critical).
TCPDF versions up to and excluding 6.2.22 are affected by CVE-2018-17057.
Attackers can exploit CVE-2018-17057 by triggering deserialization of arbitrary data using the phar:// wrapper.
Yes, you can find references for CVE-2018-17057 at the following links: [link1](https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed), [link2](http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html), [link3](http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html)