From HTML Rendering to Remote Code Execution

Neodyme's security researchers discovered a critical vulnerability in an HTML-to-PDF conversion service that utilized the outdated EO.Pdf library based on Chromium 62. By submitting specially crafted HTML content, they achieved server-side cross-site scripting (XSS), enabling actions like server-side request forgery (SSRF) and local file access. The PDF metadata revealed the exact library version, allowing the team to replicate the environment locally. They then adapted a known Chromium 62 exploit targeting a WebAssembly use-after-free vulnerability, ultimately achieving remote code execution. The exploit's success was facilitated by the renderer operating with the --no-sandbox flag, eliminating the need for a sandbox escape. This case underscores the dangers of relying on outdated components and the importance of disabling unnecessary features like JavaScript execution in server-side rendering processes.

https://neodyme.io/en/blog/html_renderer_to_rce/

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles