Description
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
INFO
Published Date :
2024-11-15T10:51:36.766Z
Last Modified :
2024-11-18T14:41:07.247Z
Source :
@huntr_ai
AFFECTED PRODUCTS
The following products are affected by CVE-2021-3838 vulnerability.
| Vendors | Products |
|---|---|
| Dompdf |
|
| Dompdf Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2021-3838.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact