Vulnerability CVE-2014-2383


Published: 2014-04-28

Description:
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
dompdf 0.6.0 Arbitrary File Read
Alejo Murillo Mo...
24.04.2014

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Dompdf -> Dompdf 

 References:
http://seclists.org/fulldisclosure/2014/Apr/258
http://www.securityfocus.com/archive/1/531912/100/0/threaded
https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/

Copyright 2024, cxsecurity.com

 

Back to Top