DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
History

Tue, 19 Nov 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Dompdf Project
Dompdf Project dompdf
CPEs cpe:2.3:a:dompdf_project:dompdf:*:*:*:*:*:*:*:*
Vendors & Products Dompdf Project
Dompdf Project dompdf

Mon, 18 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Dompdf
Dompdf dompdf
CPEs cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:*
Vendors & Products Dompdf
Dompdf dompdf
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 11:00:00 +0000

Type Values Removed Values Added
Description DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
Title PHAR Deserialization in dompdf/dompdf
Weaknesses CWE-502
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-11-15T10:51:36.766Z

Updated: 2024-11-18T14:41:07.247Z

Reserved: 2021-09-29T00:25:46.565Z

Link: CVE-2021-3838

cve-icon Vulnrichment

Updated: 2024-11-18T14:40:16.545Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T11:15:05.763

Modified: 2024-11-19T17:11:23.277

Link: CVE-2021-3838

cve-icon Redhat

No data.