Dompdf Project

Dompdf

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.81%
  • Veröffentlicht 15.11.2024 11:15:06
  • Zuletzt bearbeitet 19.11.2024 17:12:15

An improper restriction of external entities (XXE) vulnerability in dompdf/dompdf's SVG parser allows for Server-Side Request Forgery (SSRF) and deserialization attacks. This issue affects all versions prior to 2.0.0. The vulnerability can be exploit...

Exploit
  • EPSS 3.65%
  • Veröffentlicht 15.11.2024 11:15:05
  • Zuletzt bearbeitet 19.11.2024 17:11:23

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// pr...

Exploit
  • EPSS 6.15%
  • Veröffentlicht 13.12.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:36:46

Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to ve...

Exploit
  • EPSS 9.32%
  • Veröffentlicht 07.02.2023 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:48:26

Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respe...

Exploit
  • EPSS 51.46%
  • Veröffentlicht 01.02.2023 00:15:10
  • Zuletzt bearbeitet 21.11.2024 07:47:06

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attac...

Exploit
  • EPSS 53.13%
  • Veröffentlicht 25.09.2022 19:15:09
  • Zuletzt bearbeitet 22.05.2025 15:16:02

registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 18.07.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:54

External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 28.06.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:37:52

Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.

Exploit
  • EPSS 72.24%
  • Veröffentlicht 03.04.2022 03:15:08
  • Zuletzt bearbeitet 21.11.2024 06:57:13

Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).

  • EPSS 0.18%
  • Veröffentlicht 10.01.2020 06:15:11
  • Zuletzt bearbeitet 21.11.2024 02:11:16

DOMPDF before 0.6.2 allows Information Disclosure.