GHSA-577p-7j7h-2jgf

Suggest an improvement
Source
https://github.com/advisories/GHSA-577p-7j7h-2jgf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-577p-7j7h-2jgf/GHSA-577p-7j7h-2jgf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-577p-7j7h-2jgf
Aliases
Published
2024-11-15T12:31:44Z
Modified
2024-11-18T21:40:54.006890Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Deserialization of Untrusted Data in dompdf/dompdf
Details

DomPDF before version 2.0.0 is vulnerable to PHAR (PHP Archive) deserialization due to a lack of checking on the protocol before passing it into the filegetcontents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.

Database specific
{
    "nvd_published_at": "2024-11-15T11:15:05Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-15T20:36:04Z"
}
References

Affected packages

Packagist / dompdf/dompdf

Package

Name
dompdf/dompdf
Purl
pkg:composer/dompdf/dompdf

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0

Affected versions

v0.*

v0.6.0
v0.6.1
v0.6.2
v0.7.0-beta
v0.7.0-beta2
v0.7.0-beta3
v0.7.0
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.8.5
v0.8.6

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2