Skip to content

Latest commit

 

History

History
17 lines (13 loc) · 544 Bytes

File metadata and controls

17 lines (13 loc) · 544 Bytes

Poppler 21.07.0 backdoor

  • Type: hidden command
  • Affected versions: none (synthetic backdoor)

Backdoor

If the PDF file read by the vulnerable program contains a comment starting with the character '#', the rest of the comment is run as a shell command.

Triggering the backdoor

We can use a carefully crafted PDF file that executes arbitrary shell commands via the backdoor (e.g., with the backdoored version):

$ ./backdoored/build/pdf_fuzzer < backdoor-trigger.pdf
uid=0(root) gid=0(root) groups=0(root)