# mPDF 7.0 本地文件包含漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: mPDF 7.0 - Local File Inclusion - PHP webapps Exploit -- 🔗来源链接
标签:exploit
神龙速读:
- **Edb-ID:** 50995
- **CVE:** N/A
- **Author:** MUSYOKA IAN
- **Type:** WEBAPPS
- **Platform:** PHP
- **Date:** 2022-08-01
- **Vulnerable App:** mPDF 7.0
- **Exploit Details:**
- Local File Inclusion vulnerability in mPDF 7.0.
- Exploit code provided for testing local file inclusion on a target system.
- Payload generation script for creating malicious annotation files.
标题: mPDF – mPDF Manual -- 🔗来源链接
标签:product
神龙速读:
## 关键漏洞信息
- **用户输入处理**
- mPDF 不直接处理外部用户的 HTML/CSS 输入。
- 所有传递给 mPDF 的用户输入应经过严格验证和净化,超出标准浏览器级净化(如 `htmlspecialchars`)的水平。
- **开发状态和安全性**
- mPDF 作为一个整体是一个相当过时的软件,支持可能会逐渐减少。
- 已不再支持无PHP方案或现代CSS特性,这可能引发兼容性和安全性问题。
标题: mPDF 7.0 - Local File Inclusion | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 漏洞关键信息
- **标题**: mPDF 7.0 - Local File Inclusion
- **严重性**: HIGH
- **日期**: January 13, 2026
- **影响范围**: mPDF 7.0
- **CVE**: CVE-2022-50897
- **CWE**: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
- **CVSS评分**: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
- **参考资料**:
- ExploitDB-50995
- Official mPDF Project Homepage
- **发现者**: Musyoka Ian
- **描述**: mPDF 7.0 contains a local file inclusion vulnerability that allows attackers to read arbitrary system files by manipulating annotation file parameters. Attackers can generate URL-encoded or base64 payloads to include local files through crafted annotation content with file path specifications.
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.