[
https://issues.apache.org/jira/browse/PDFBOX-6196?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Andreas Lehmkühler closed PDFBOX-6196.
--------------------------------------
Resolution: Duplicate
What exactly was the purpose of this ticket?
The PR is already handled in PDFBOX-6180. There is already a public
announcement of that CVE on our mailing lists and more important, the regular
jar of pdfbox isn't affected at all, but one of the examples is.
> PDFBox 3.0.7 MEDIUM CVE-2026-33929
> ----------------------------------
>
> Key: PDFBOX-6196
> URL: https://issues.apache.org/jira/browse/PDFBOX-6196
> Project: PDFBox
> Issue Type: Bug
> Affects Versions: 3.0.7 PDFBox
> Reporter: William Holmes
> Priority: Major
> Labels: vulnerability
>
> -*pdfbox-3.0.7.jar*- this jar isn't affected
> *pdfbox-examples.3.0.7.jar*
> *CVE-2026-33929*
> *Description*
> Improper Limitation of a Pathname to a Restricted Directory ('Path
> Traversal') vulnerability in Apache PDFBox Examples. This issue affects the
> ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36,
> from 3.0.0 through 3.0.7. Users are recommended to update to version 2.0.37
> or 3.0.8 once available. Until then, they should apply the fix provided in
> GitHub PR 427. The ExtractEmbeddedFiles example contained a path traversal
> vulnerability (CWE-22) mentioned in CVE-2026-23907. However the change in the
> releases 2.0.36 and 3.0.7 is flawed because it doesn't consider the file path
> separator. Because of that, a user having writing rights on /home/ABC could
> be victim to a malicious PDF resulting in a write attempt to any path
> starting with /home/ABC, e.g. "/home/ABCDEF". Users who have copied this
> example into their production code should apply the mentioned change. The
> example has been changed accordingly and is available in the project
> repository.
> *Origin*
> -pdfbox-3.0.7.jar- this jar isn't affected
> pdfbox-examples.3.0.7.jar
> *Risk*
> Exploitable
> {*}References{*}:
> 1. [https://github.com/apache/pdfbox]
> 2. [https://nvd.nist.gov/vuln/detail/CVE-2026-33929]
> 3. [https://github.com/apache/pdfbox/pull/427/changes]
> 4. [https://lists.apache.org/thread/j8l07tgzy9dm8d8n0f3c45h7zg7t3ld6]
> 5. [https://lists.apache.org/thread/op3lyx1ngzy4qycn06l6hljyf28ff0zs]
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]