Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-2383 PoC — dompdf 信息泄露漏洞

Source
Associated Vulnerability
Title:dompdf 信息泄露漏洞 (CVE-2014-2383)
Description:dompdf是一套HTML到PDF的转换工具。该工具采用样式驱动,支持下载并读取外部样式、整个样式标签和单个HTML元素的样式属性等。 dompdf 0.6.0:beta3及之前版本的dompdf.php文件中存在安全漏洞,当使用DOMPDF_ENABLE_PHP时,攻击者可借助PHP协议和‘input_file’参数利用该漏洞绕过改变根目录保护机制,读取任意文件。
Description
A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
File Snapshot

id: CVE-2014-2383 info: name: Dompdf < v0.6.0 - Local File Inclusion author: 0x_Akoko,akincibor ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.