CVE-2024-25117

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25117
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25117.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-25117
Aliases
Related
Published
2024-02-21T17:15:09Z
Modified
2024-12-24T10:48:28.901686Z
Summary
[none]
Details

php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The Style::fromAttributes(), or the Style::parseCssStyle() should check the content of the font-family and prevents it to use a PHAR url, to avoid passing an invalid and dangerous fontName value to other libraries. The same check as done in the Style::fromStyleSheets might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the fontName that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.

References

Affected packages

Debian:12 / php-dompdf-svg-lib

Package

Name
php-dompdf-svg-lib
Purl
pkg:deb/debian/php-dompdf-svg-lib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.0-3+deb12u1

Affected versions

0.*

0.5.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/dompdf/php-svg-lib

Affected ranges

Type
GIT
Repo
https://github.com/dompdf/php-svg-lib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.3.4
0.4.0
0.4.1
0.5.0
0.5.1

v0.*

v0.1
v0.2
v0.3
v0.3.0
v0.3.1
v0.3.2
v0.3.3