GHSA-qr6q-w4gj-3865

Suggest an improvement
Source
https://github.com/advisories/GHSA-qr6q-w4gj-3865
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qr6q-w4gj-3865/GHSA-qr6q-w4gj-3865.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qr6q-w4gj-3865
Aliases
Published
2022-05-14T02:53:19Z
Modified
2024-12-08T05:33:39.406584Z
Summary
DOMPDF Arbitrary File Read
Details

dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the inputfile parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the inputfile parameter.

Database specific
{
    "nvd_published_at": "2014-04-28T14:09:00Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-25T23:00:25Z"
}
References

Affected packages

Packagist / dompdf/dompdf

Package

Name
dompdf/dompdf
Purl
pkg:composer/dompdf/dompdf

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.6.0
Fixed
0.6.1

Affected versions

v0.*

v0.6.0