Security Advisories์ถ์ฒ: GitHub Security Advisories์กฐํ์ 7
[jspdf] jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions
By GitHub2026๋
2์ 20์ผ
**[jspdf] jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions**
Impact User control of the first argument of the addImage method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, wich lead to excessive memory allocation. Other affected methods are: html. Example attack vector: import { jsPDF } from "jspdf" // malicious GIF image data with large width/height headers const payload = .....
---
**[devsupporter ํด์ค]**
์ด ๊ธฐ์ฌ๋ GitHub Security Advisories์์ ์ ๊ณตํ๋ ์ต์ ๊ฐ๋ฐ ๋ํฅ์ ๋๋ค. ๊ด๋ จ ๋๊ตฌ๋ ๊ธฐ์ ์ ๋ํด ๋ ์์๋ณด์๋ ค๋ฉด ์๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ์ธ์.
Impact User control of the first argument of the addImage method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, wich lead to excessive memory allocation. Other affected methods are: html. Example attack vector: import { jsPDF } from "jspdf" // malicious GIF image data with large width/height headers const payload = .....
---
**[devsupporter ํด์ค]**
์ด ๊ธฐ์ฌ๋ GitHub Security Advisories์์ ์ ๊ณตํ๋ ์ต์ ๊ฐ๋ฐ ๋ํฅ์ ๋๋ค. ๊ด๋ จ ๋๊ตฌ๋ ๊ธฐ์ ์ ๋ํด ๋ ์์๋ณด์๋ ค๋ฉด ์๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ์ธ์.
![[jspdf] jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions](/assets/images/github_com_1771583680363.png)