CVE-2014-2383

NameCVE-2014-2383
Descriptiondompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs745619

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-dompdf (PTS)jessie0.6.1+dfsg-2+deb8u1fixed
stretch0.6.2+dfsg-3fixed
buster (security), buster, buster (lts)0.6.2+dfsg-3+deb10u2fixed
bullseye0.6.2+dfsg-3.1fixed
bookworm2.0.3+dfsg-1fixed
sid, trixie3.0.0+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-dompdfsource(unstable)0.6.1+dfsg-2unimportant745619

Notes

requires DOMPDF_ENABLE_REMOTE (disabled by default) to be enabled

Search for package or bug name: Reporting problems