← Retour aux CVEs
CVE-2014-2383
N/ADescription
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Details CVE
Score CVSS v3.1N/A
Publie4/28/2014
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
dompdf:dompdf
Faiblesses (CWE)
CWE-200
References
http://seclists.org/fulldisclosure/2014/Apr/258(cve@mitre.org)
http://www.securityfocus.com/archive/1/531912/100/0/threaded(cve@mitre.org)
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/(cve@mitre.org)
http://seclists.org/fulldisclosure/2014/Apr/258(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/531912/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028(af854a3a-2127-422b-91ae-364da2661108)
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.