Vulnerabilites related to dompdf - dompdf
CVE-2023-24813 (GCVE-0-2023-24813)
Vulnerability from cvelistv5
Published
2023-02-07 18:05
Modified
2025-03-10 21:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-436 - Interpretation Conflict
Summary
Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:19.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75" }, { "name": "https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24813", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T21:02:26.149057Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T21:15:40.002Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "dompdf", "vendor": "dompdf", "versions": [ { "status": "affected", "version": "= 2.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it\u0027s possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-436", "description": "CWE-436: Interpretation Conflict", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-07T18:05:14.541Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75" }, { "name": "https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa" } ], "source": { "advisory": "GHSA-56gj-mvh6-rp75", "discovery": "UNKNOWN" }, "title": "URI validation failure on SVG parsing. Bypass of CVE-2023-23924" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-24813", "datePublished": "2023-02-07T18:05:14.541Z", "dateReserved": "2023-01-30T14:43:33.704Z", "dateUpdated": "2025-03-10T21:15:40.002Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-23924 (GCVE-0-2023-23924)
Vulnerability from cvelistv5
Published
2023-01-31 23:54
Modified
2025-03-10 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-551 - Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
Summary
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:42:27.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg" }, { "name": "https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85" }, { "name": "https://github.com/dompdf/dompdf/releases/tag/v2.0.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/releases/tag/v2.0.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-23924", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T21:02:06.465214Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T21:17:31.944Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "dompdf", "vendor": "dompdf", "versions": [ { "status": "affected", "version": "\u003c 2.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `\u003cimage\u003e` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP \u003c 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-551", "description": "CWE-551: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T23:54:30.162Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg" }, { "name": "https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85" }, { "name": "https://github.com/dompdf/dompdf/releases/tag/v2.0.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dompdf/dompdf/releases/tag/v2.0.2" } ], "source": { "advisory": "GHSA-3cw5-7cxw-v5qg", "discovery": "UNKNOWN" }, "title": "URI validation failure on SVG parsing in Dompdf" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23924", "datePublished": "2023-01-31T23:54:30.162Z", "dateReserved": "2023-01-19T21:12:31.358Z", "dateUpdated": "2025-03-10T21:17:31.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2383 (GCVE-0-2014-2383)
Vulnerability from cvelistv5
Published
2014-04-28 00:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028" }, { "name": "20140423 CVE-2014-2383 - Arbitrary file read in dompdf", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/258" }, { "name": "20140423 CVE-2014-2383 - Arbitrary file read in dompdf", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531912/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/" }, { "url": "https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028" }, { "name": "20140423 CVE-2014-2383 - Arbitrary file read in dompdf", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/258" }, { "name": "20140423 CVE-2014-2383 - Arbitrary file read in dompdf", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/531912/100/0/threaded" }, { "url": "https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2383", "datePublished": "2014-04-28T00:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2024-08-06T10:14:25.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-50262 (GCVE-0-2023-50262)
Vulnerability from cvelistv5
Published
2023-12-13 20:52
Modified
2024-08-02 22:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself.
php-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images.
When Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request.
Version 2.0.4 contains a fix for this issue.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:16:46.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2" }, { "name": "https://github.com/dompdf/dompdf/commit/41cbac16f3cf56affa49f06e8dae66d0eac2b593", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/commit/41cbac16f3cf56affa49f06e8dae66d0eac2b593" }, { "name": "https://github.com/dompdf/dompdf/blob/v2.0.3/src/Image/Cache.php#L136-L153", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dompdf/dompdf/blob/v2.0.3/src/Image/Cache.php#L136-L153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dompdf", "vendor": "dompdf", "versions": [ { "status": "affected", "version": "\u003c 2.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself.\n\nphp-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images.\n\nWhen Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request.\n\nVersion 2.0.4 contains a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-674", "description": "CWE-674: Uncontrolled Recursion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T20:52:56.173Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2" }, { "name": "https://github.com/dompdf/dompdf/commit/41cbac16f3cf56affa49f06e8dae66d0eac2b593", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dompdf/dompdf/commit/41cbac16f3cf56affa49f06e8dae66d0eac2b593" }, { "name": "https://github.com/dompdf/dompdf/blob/v2.0.3/src/Image/Cache.php#L136-L153", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dompdf/dompdf/blob/v2.0.3/src/Image/Cache.php#L136-L153" } ], "source": { "advisory": "GHSA-3qx2-6f78-w2j2", "discovery": "UNKNOWN" }, "title": "Dompdf possible DoS caused by infinite recursion when parsing SVG images" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-50262", "datePublished": "2023-12-13T20:52:56.173Z", "dateReserved": "2023-12-05T20:42:59.379Z", "dateUpdated": "2024-08-02T22:16:46.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2014-04-28 14:09
Modified
2025-04-12 10:46
Severity ?
Summary
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2014/Apr/258 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/531912/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce | ||
cve@mitre.org | https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/ | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Apr/258 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/531912/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/ | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:*", "matchCriteriaId": "8695C9FA-C3ED-45EB-8533-C8C78C413DBE", "versionEndIncluding": "0.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter." }, { "lang": "es", "value": "dompdf.php en dompdf anterior a 0.6.1, cuando DOMPDF_ENABLE_PHP est\u00e1 habilitado, permite a atacantes dependientes de contexto evadir protecciones chroot y leer archivos arbitrarios a trav\u00e9s de un protocolo PHP y envoltorios en el par\u00e1metro input_file, tal y como fue demostrado por un php://filter/read=convert.base64-encode/resource en el par\u00e1metro input_file." } ], "id": "CVE-2014-2383", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-28T14:09:06.707", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/258" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531912/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531912/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }