Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xcjZxLXc0Z2otMzg2Nc4AAWI_
DOMPDF Arbitrary File Read
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP
is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource
in the input_file parameter.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xcjZxLXc0Z2otMzg2Nc4AAWI_
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 7 months ago
Identifiers: GHSA-qr6q-w4gj-3865, CVE-2014-2383
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-2383
- https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028
- http://seclists.org/fulldisclosure/2014/Apr/258
- https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2014-2383.yaml
- https://web.archive.org/web/20151215023329/http://www.securityfocus.com/archive/1/531912/100/0/threaded
- https://github.com/advisories/GHSA-qr6q-w4gj-3865
Blast Radius: 0.0
Affected Packages
packagist:dompdf/dompdf
Dependent packages: 555Dependent repositories: 22,012
Downloads: 112,987,439 total
Affected Version Ranges: >= 0.6.0, < 0.6.1
Fixed in: 0.6.1
All affected versions: 0.6.0
All unaffected versions: 0.6.1, 0.6.2, 0.7.0, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.2.2, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.7, 2.0.8, 3.0.0