Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28699: n/a

0
High
VulnerabilityCVE-2024-28699cvecve-2024-28699
Published: Mon Apr 22 2024 (04/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow vulnerability in pdf2json v0.70 allows a local attacker to execute arbitrary code via the GString::copy() and ImgOutputDev::ImgOutputDev function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:11:21 UTC

Technical Analysis

CVE-2024-28699 identifies a buffer overflow vulnerability in the pdf2json library version 0.70, specifically within the GString::copy() and ImgOutputDev::ImgOutputDev functions. Pdf2json is a tool used to convert PDF files into JSON format, often integrated into document processing pipelines or software that requires PDF content extraction. The vulnerability stems from improper bounds checking during string copying operations, allowing an attacker with local access and limited privileges to overwrite memory buffers. This memory corruption can lead to arbitrary code execution, enabling the attacker to escalate privileges or execute malicious payloads on the affected system. The CVSS 3.1 base score of 7.8 reflects a high severity due to the combination of local attack vector, low attack complexity, required privileges, and the potential for full confidentiality, integrity, and availability compromise. No user interaction is necessary once local access is achieved. Although no public exploits have been reported, the presence of such a vulnerability in a widely used PDF parsing library poses a significant risk, especially in environments where pdf2json is part of automated workflows or exposed to untrusted users. The lack of available patches at the time of publication necessitates proactive mitigation and monitoring by organizations relying on this software.

Potential Impact

The impact of CVE-2024-28699 is substantial for organizations using pdf2json in their software stacks. Successful exploitation allows local attackers to execute arbitrary code, potentially leading to privilege escalation, data theft, or disruption of services. This compromises the confidentiality, integrity, and availability of affected systems. Since pdf2json is often embedded in document processing applications, the vulnerability could be leveraged to compromise servers handling sensitive documents or internal workflows. The requirement for local access limits remote exploitation but does not eliminate risk, especially in multi-user environments, shared hosting, or systems where attackers can gain initial footholds through other means. The absence of patches increases exposure time, raising the likelihood of exploitation attempts once proof-of-concept code becomes available. Organizations with automated PDF processing pipelines or those that allow untrusted users to upload files for conversion are particularly vulnerable. The vulnerability could also be chained with other exploits to achieve broader network compromise.

Mitigation Recommendations

To mitigate CVE-2024-28699, organizations should first identify all instances of pdf2json version 0.70 in their environments, including embedded uses in third-party applications. Until an official patch is released, consider the following specific actions: 1) Restrict local access to systems running pdf2json to trusted users only, minimizing the risk of local exploitation. 2) Employ application sandboxing or containerization to isolate pdf2json processes and limit the impact of potential code execution. 3) Monitor system logs and behavior for unusual activity indicative of exploitation attempts, such as unexpected process spawning or memory corruption signs. 4) If feasible, replace pdf2json with alternative PDF parsing tools that do not have this vulnerability or use updated versions once patches are available. 5) Implement strict file upload validation and scanning to prevent malicious PDF files from reaching pdf2json processing. 6) Use operating system security features like SELinux or AppArmor to enforce least privilege on pdf2json processes. 7) Stay alert for vendor or community updates providing patches or workarounds and apply them promptly. 8) Conduct internal security assessments to evaluate the risk posed by this vulnerability in your specific deployment context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d95b7ef31ef0b588f5d

Added to database: 2/25/2026, 9:45:57 PM

Last enriched: 2/26/2026, 6:11:21 PM

Last updated: 4/12/2026, 3:34:34 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses