Abstract Advisory Information


The PDF engine allow loading local or remote content using specific HTML class of tags.

Author: Dominique RIGHETTO

Version affected


Name: PD4ML java library

Versions: 4.0.15fx1

Common Vulnerability Scoring System


6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Patches


None

References


Vulnerability Disclosure Timeline


  • 07/12/2022: Vulnerability discovery
  • 08/12/2022: Vulnerability Report to CERT-XLM
  • 09/12/2022: Vulnerability Report to Vendor through form
  • 09/12/2022: Vendor replied, Vulnerability Report sent
  • 09/12/2022: There is nothing to fix from Vendor perspective
  • 16/12/2022: Send e-mail to vendor again to press on them. The vendor recognizes the vulnerability.
  • 20/12/2022: Send e-mail to vendor to set up a technical meeting
  • 23/12/2022: Send e-mail to vendor to set up a technical meeting
  • 06/01/2023: Informed vendor of an update in the advisory
  • 09/01/2023: Meeting held to discuss the technicalities.
  • 09/01/2023: Message sent to the vendor to say that we will start our usual publication process
  • 03/03/2023: Request CVE ID to Mitre
  • 03/03/2023: CVE IDs assigned Use CVE-2023-27565
  • 17/03/2023: Public disclosure by Excellium Services