Packagist (Composer) package
dompdf/dompdf
pkg:composer/dompdf/dompdf
Vulnerabilities (14)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-3902 | — | < 2.0.0 | 2.0.0 | Nov 15, 2024 | An improper restriction of external entities (XXE) vulnerability in dompdf/dompdf's SVG parser allows for Server-Side Request Forgery (SSRF) and deserialization attacks. This issue affects all versions prior to 2.0.0. The vulnerability can be exploited even if the isRemoteEnabled | ||
| CVE-2021-3838 | — | < 2.0.0 | 2.0.0 | Nov 15, 2024 | DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uplo | ||
| CVE-2023-50262 | — | < 2.0.4 | 2.0.4 | Dec 13, 2023 | Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chain | ||
| CVE-2023-24813 | — | >= 2.0.2, < 2.0.3 | 2.0.3 | Feb 7, 2023 | Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href | ||
| CVE-2023-23924 | — | < 2.0.2 | 2.0.2 | Jan 31, 2023 | Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerabil | ||
| CVE-2022-41343 | — | < 2.0.1 | 2.0.1 | Sep 25, 2022 | registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule. | ||
| CVE-2022-2400 | — | < 2.0.0 | 2.0.0 | Jul 18, 2022 | External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0. | ||
| CVE-2022-0085 | — | < 2.0.0 | 2.0.0 | Jun 28, 2022 | Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0. | ||
| CVE-2022-28368 | — | < 1.2.1 | 1.2.1 | Apr 3, 2022 | Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file). | ||
| CVE-2014-5011 | — | >= 0.6, < 0.6.2 | 0.6.2 | Jan 10, 2020 | DOMPDF before 0.6.2 allows Information Disclosure. | ||
| CVE-2014-5012 | — | >= 0.6, < 0.6.2 | 0.6.2 | Jan 10, 2020 | DOMPDF before 0.6.2 allows denial of service. | ||
| CVE-2014-5013 | — | >= 0.6, < 0.6.2 | 0.6.2 | Jan 10, 2020 | DOMPDF before 0.6.2 allows remote code execution, a related issue to CVE-2014-2383. | ||
| CVE-2014-2383 | — | >= 0.6.0, < 0.6.1 | 0.6.1 | Apr 28, 2014 | dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode | ||
| CVE-2010-4879 | — | >= 0.6, < 0.6.1 | 0.6.1 | Oct 7, 2011 | PHP remote file inclusion vulnerability in dompdf.php in dompdf 0.6.0 beta1 allows remote attackers to execute arbitrary PHP code via a URL in the input_file parameter. |
- CVE-2021-3902Nov 15, 2024affected < 2.0.0fixed 2.0.0
An improper restriction of external entities (XXE) vulnerability in dompdf/dompdf's SVG parser allows for Server-Side Request Forgery (SSRF) and deserialization attacks. This issue affects all versions prior to 2.0.0. The vulnerability can be exploited even if the isRemoteEnabled
- CVE-2021-3838Nov 15, 2024affected < 2.0.0fixed 2.0.0
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uplo
- CVE-2023-50262Dec 13, 2023affected < 2.0.4fixed 2.0.4
Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chain
- CVE-2023-24813Feb 7, 2023affected >= 2.0.2, < 2.0.3fixed 2.0.3
Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href
- CVE-2023-23924Jan 31, 2023affected < 2.0.2fixed 2.0.2
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerabil
- CVE-2022-41343Sep 25, 2022affected < 2.0.1fixed 2.0.1
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
- CVE-2022-2400Jul 18, 2022affected < 2.0.0fixed 2.0.0
External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.
- CVE-2022-0085Jun 28, 2022affected < 2.0.0fixed 2.0.0
Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.
- CVE-2022-28368Apr 3, 2022affected < 1.2.1fixed 1.2.1
Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
- CVE-2014-5011Jan 10, 2020affected >= 0.6, < 0.6.2fixed 0.6.2
DOMPDF before 0.6.2 allows Information Disclosure.
- CVE-2014-5012Jan 10, 2020affected >= 0.6, < 0.6.2fixed 0.6.2
DOMPDF before 0.6.2 allows denial of service.
- CVE-2014-5013Jan 10, 2020affected >= 0.6, < 0.6.2fixed 0.6.2
DOMPDF before 0.6.2 allows remote code execution, a related issue to CVE-2014-2383.
- CVE-2014-2383Apr 28, 2014affected >= 0.6.0, < 0.6.1fixed 0.6.1
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode
- CVE-2010-4879Oct 7, 2011affected >= 0.6, < 0.6.1fixed 0.6.1
PHP remote file inclusion vulnerability in dompdf.php in dompdf 0.6.0 beta1 allows remote attackers to execute arbitrary PHP code via a URL in the input_file parameter.