vendor:
dompdf
by:
Alejo Murillo Moyas
7,5
CVSS
HIGH
Arbitrary file read
22
CWE
Product Name: dompdf
Affected Version From: v0.6.0
Affected Version To: v0.6.1
Patch Exists: YES
Related CWE: CVE-2014-2383
CPE: dompdf
Other Scripts:
N/A
Tags: cve,lfi,wp-plugin,wpscan,cve2014,dompdf,wordpress,wp,edb,seclists
CVSS Metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
Nuclei References:
https://www.exploit-db.com/exploits/33004, http://seclists.org/fulldisclosure/2014/Apr/258, https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/, https://wpscan.com/vulnerability/1d64d0cb-6b71-47bb-8807-7c8350922582, https://nvd.nist.gov/vuln/detail/CVE-2014-2383
Nuclei Metadata: {'max-request': 11, 'verified': True, 'vendor': 'dompdf', 'product': 'dompdf'}
Platforms Tested: Web
2014
Arbitrary file read in dompdf
A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Mitigation:
Disable the DOMPDF_ENABLE_PHP and DOMPDF_ENABLE_REMOTE flags, and ensure that the DOMPDF_CHROOT flag is properly configured.