DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
References
Link | Resource |
---|---|
https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a | Patch |
https://huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
19 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dompdf Project dompdf
Dompdf Project |
|
References | () https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a - Patch | |
References | () https://huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e - Exploit, Issue Tracking, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:dompdf_project:dompdf:*:*:*:*:*:*:*:* |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 11:15
Updated : 2024-11-19 17:11
NVD link : CVE-2021-3838
Mitre link : CVE-2021-3838
CVE.ORG link : CVE-2021-3838
JSON object : View
Products Affected
dompdf_project
- dompdf
CWE
CWE-502
Deserialization of Untrusted Data