pdfkit is vulnerable to command injection. A remote attacker is able to execute malicious code on the system through a specifically crafted query string parameter due to the improper sanitization of user input in initialize
function.
packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html
github.com/pdfkit/pdfkit/blob/46cdf53ec540da1a1a2e4da979e3e5fe2f92a257/lib/pdfkit/pdfkit.rb%23L55-L58
github.com/pdfkit/pdfkit/blob/master/lib/pdfkit/source.rb%23L44-L50
github.com/pdfkit/pdfkit/blob/v0.8.6/lib/pdfkit/source.rb#L28-L36
lists.fedoraproject.org/archives/list/[email protected]/message/C36GAV3TKM3JXV6UVMLMTTDRCPKSNETQ/
lists.fedoraproject.org/archives/list/[email protected]/message/ESWB6SX7HYWQ54UGBGQOZ7G24O6RAOKD/
lists.fedoraproject.org/archives/list/[email protected]/message/JFB2BFKH5SUGRKXMY6PWRQNGKZML7GDT/