GHSA-vpr4-p6fq-85jcHigh
Snappy: Binary path is never shell-escaped due to an inverted is_executable check
🔗 CVE IDs covered (1)
📋 Description
### Impact
On POSIX, escapeshellarg(‘/usr/bin/wkhtmltopdf’) returns the literal string ‘/usr/bin/wkhtmltopdf’ with the single-quote characters included. is_executable() then looks for a file whose actual name contains those quote characters, which essentially never exists. The safe branch is dead code and $command always falls through to the raw, unescaped value.
The rest of the arguments (options, input, output) are escaped correctly, so injection has to land in the binary string itself. That happens whenever the binary path is sourced from configuration that is user-influenced, derived from environment variables that ultimately come from request data, or concatenated with any user-controlled fragment.
#### Proof of concept:
```php
$pdf = new Knp\Snappy\Pdf(‘wkhtmltopdf; touch /tmp/snappy_rce’);
$pdf->generate(‘https://example.com’, ‘/tmp/out.pdf’);
// /tmp/snappy_rce is created.
```
**Impact:** command execution as the PHP process when the binary path is attacker-influenced. Even in deployments where the binary is hard-coded, this is a defensive-in-depth regression: downstream packages reasonably assume Snappy shell-escapes the binary because the code looks like it does.
### Patches
The version 1.7.1 will resolve this security advisory.
### Workarounds
Before calling the constructor, ensure `\is_executable($path)` is truthy.
```php
// Bad example
$pdf = new Knp\Snappy\Pdf('/path/to/binary');
```
```php
// Better example
$pathToBinary = '/path/to/binary';
if (!\is_executable($pathToBinary)) {
throw new \RuntimeException();
}
$pdf = new Knp\Snappy\Pdf('/path/to/binary');
```
🎯 Affected products1
- composer/KnpLabs/knp-snappy:<= 1.7.0