Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3838

Опубликовано: 15 нояб. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

esm-apps/bionic

released

0.6.2+dfsg-3ubuntu0.18.04.1~esm1
esm-apps/focal

released

0.6.2+dfsg-3ubuntu0.20.04.1
esm-apps/jammy

released

0.6.2+dfsg-3.1ubuntu0.1
esm-apps/xenial

released

0.6.1+dfsg-2ubuntu1+esm1
focal

released

0.6.2+dfsg-3ubuntu0.20.04.1
jammy

released

0.6.2+dfsg-3.1ubuntu0.1
kinetic

ignored

end of life, was needed
lunar

DNE

Показывать по

EPSS

Процентиль: 87%
0.03462
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 1 года назад

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.

CVSS3: 9.8
debian
около 1 года назад

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due ...

CVSS3: 9.8
github
около 1 года назад

Deserialization of Untrusted Data in dompdf/dompdf

EPSS

Процентиль: 87%
0.03462
Низкий

9.8 Critical

CVSS3