NA

CVE-2023-23924

Published: 01/02/2023 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions prior to 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dompdf project dompdf 2.0.1

Github Repositories

CVE-2023-23924 (Dompdf - RCE) PoC

CVE-2023-23924 Dompdf vulnerable to URI validation failure on SVG parsing · CVE-2023-23924 · GitHub Advisory Database githubcom/advisories/GHSA-3cw5-7cxw-v5qg Run # Terminal 1 ❯ cd www ❯ php -S 127001:9000 -t # Terminal 2 ❯ cd src ❯ php cve_2023_23924php Check Check the "whoami" command is r