We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-3838

PHAR Deserialization in dompdf/dompdf



Description

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.

Reserved 2021-09-29 | Published 2024-11-15 | Updated 2024-11-18 | Assigner @huntr_ai


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Any version before 2.0.0
affected

References

huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e

github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a

cve.org (CVE-2021-3838)

nvd.nist.gov (CVE-2021-3838)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-3838

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.