Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-28368

Опубликовано: 03 апр. 2022
Источник: debian

Описание

Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-dompdfnot-affectedpackage

Примечания

  • https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/

  • https://positive.security/blog/dompdf-rce

  • https://github.com/dompdf/dompdf/issues/2598

  • https://github.com/dompdf/dompdf/pull/2808

  • https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d (v1.2.1)

  • Vulnerability introduced by:

  • https://github.com/dompdf/dompdf/commit/0e0261b7bce372b3a05b712a023f6f742a22d57e (v0.8.0)

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).

CVSS3: 9.8
nvd
почти 4 года назад

Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).

CVSS3: 9.8
github
почти 4 года назад

Remote code injection in dompdf/dompdf