Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qr6q-w4gj-3865

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

DOMPDF Arbitrary File Read

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.

Пакеты

Наименование

dompdf/dompdf

composer
Затронутые версииВерсия исправления

>= 0.6.0, < 0.6.1

0.6.1

EPSS

Процентиль: 98%
0.5489
Средний

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 12 лет назад

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.

nvd
почти 12 лет назад

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.

debian
почти 12 лет назад

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, ...

EPSS

Процентиль: 98%
0.5489
Средний

Дефекты

CWE-200