Hi pdf-reader developers,
I'm writing to report a Denial of Service (DoS) vulnerability I discovered in the pdf-reader gem (version 2.14.1). When parsing a specially crafted PDF file with circular object references, the library enters an infinite recursive loop, which results in a SystemStackError and crashes the application. An attacker could use this to cause a DoS condition in any service that uses pdf-reader to process untrusted PDF files.
I have prepared a detailed vulnerability report and a proof-of-concept (PoC) crash file. You can find all the materials in the following Google Drive folder: https://drive.google.com/drive/folders/11MK4cfn6sesBD9uRb3uwLR71wfM2fbJr
Please let me know if you need any assistance in debugging or fixing this issue. I'm happy to help in any way I can.
Once you have confirmed the vulnerability, I would appreciate it if you could take the lead on requesting a CVE identifier for this issue.
Thank you for your time and attention to this matter.
Best regards,
Yann
Security Team @ Riema Labs
Hi James,
Thanks so much for the incredibly fast response and for preparing a fix already! We really appreciate you taking this report seriously.
Yes, you absolutely have our permission to include the PoC file in your test suite. We're glad it can be used to prevent future regressions.
I'll take a look at the pull request shortly and will leave any feedback directly on GitHub.
Regarding the next steps, once the fix is merged and a new version is released, we can proceed with the CVE request. Please let me know if you'd prefer to request the CVE identifier yourself or if you'd like me to handle the submission. We're happy to do it either way.
Thanks again for your excellent work on this.
Best regards,
Yann
Security Team @ Riema Labs