### [CVE-2014-2383](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2383) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter. ### POC #### Reference - https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/DavidePastore/composer-audit - https://github.com/H0j3n/EzpzCheatSheet - https://github.com/Live-Hack-CVE/CVE-2014-2383 - https://github.com/Relativ3Pa1n/CVE-2014-2383-LFI-to-RCE-Escalation - https://github.com/nhthongDfVn/File-Converter-Exploit - https://github.com/violinist-dev/symfony-cloud-security-checker