Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-23924

Опубликовано: 01 фев. 2023
Источник: debian
EPSS Средний

Описание

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-dompdfnot-affectedpackage

Примечания

  • https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg

  • https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85 (v2.0.2)

EPSS

Процентиль: 98%
0.57103
Средний

Связанные уязвимости

CVSS3: 10
ubuntu
больше 2 лет назад

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.

CVSS3: 10
nvd
больше 2 лет назад

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.

CVSS3: 10
github
больше 2 лет назад

Dompdf vulnerable to URI validation failure on SVG parsing

CVSS3: 10
fstec
больше 2 лет назад

Уязвимость PHP-библиотеки генерации PDF-документов из HTML-разметки и CSS-стилей Dompdf, связанная с неверным порядком проверки авторизация перед синтаксическим анализом и канонизацией, позволяющая нарушителю удалить произвольные файлы или выполнить произвольный код

EPSS

Процентиль: 98%
0.57103
Средний