dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qr6q-w4gj-3865 | DOMPDF Arbitrary File Read |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T10:14:25.879Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2383
No data.
Status : Deferred
Published: 2014-04-28T14:09:06.707
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-2383
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA