Learn about the CVE-2021-43113 vulnerability in iTextPDF, allowing command injection via mishandled filenames in Ghostscript. Find mitigation steps and preventive measures here.
iTextPDF in iText 7 and up to (excluding 4.4.13.3) 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.
Understanding CVE-2021-43113
What is CVE-2021-43113?
The CVE-2021-43113 vulnerability refers to a command injection issue in iTextPDF affecting versions up to 7.1.17, excluding 4.4.13.3, which can be exploited through a mishandled filename in the Ghostscript command line.
The Impact of CVE-2021-43113
This vulnerability can potentially allow an attacker to execute arbitrary commands on the system, leading to unauthorized access, data theft, or further compromise of the affected system.
Technical Details of CVE-2021-43113
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by manipulating the filename in the CompareTool, enabling the injection of malicious commands in GhostscriptHelper.java.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates