Количество 4
Количество 4
CVE-2021-3838
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
CVE-2021-3838
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
CVE-2021-3838
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due ...
GHSA-577p-7j7h-2jgf
Deserialization of Untrusted Data in dompdf/dompdf
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-3838 DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code. | CVSS3: 9.8 | 3% Низкий | около 1 года назад | |
CVE-2021-3838 DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code. | CVSS3: 9.8 | 3% Низкий | около 1 года назад | |
CVE-2021-3838 DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due ... | CVSS3: 9.8 | 3% Низкий | около 1 года назад | |
GHSA-577p-7j7h-2jgf Deserialization of Untrusted Data in dompdf/dompdf | CVSS3: 9.8 | 3% Низкий | около 1 года назад |
Уязвимостей на страницу