From HTML Rendering to Remote Code Execution
Neodyme's security researchers discovered a critical vulnerability in an HTML-to-PDF conversion service that utilized the outdated EO.Pdf library based on Chromium 62. By submitting specially crafted HTML content, they achieved server-side cross-site scripting (XSS), enabling actions like server-side request forgery (SSRF) and local file access. The PDF metadata revealed the exact library version, allowing the team to replicate the environment locally. They then adapted a known Chromium 62 exploit targeting a WebAssembly use-after-free vulnerability, ultimately achieving remote code execution. The exploit's success was facilitated by the renderer operating with the --no-sandbox
flag, eliminating the need for a sandbox escape. This case underscores the dangers of relying on outdated components and the importance of disabling unnecessary features like JavaScript execution in server-side rendering processes.
Comments
Post a Comment