CVE-2014-2383

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:*

History

21 Nov 2024, 02:06

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2014/Apr/258 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2014/Apr/258 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/531912/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/531912/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce - () https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce -
References () https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028 - Patch, Third Party Advisory () https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028 - Patch, Third Party Advisory
References () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/ - Broken Link () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/ - Broken Link

Information

Published : 2014-04-28 14:09

Updated : 2024-11-21 02:06


NVD link : CVE-2014-2383

Mitre link : CVE-2014-2383

CVE.ORG link : CVE-2014-2383


JSON object : View

Products Affected

dompdf

  • dompdf
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor