mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-14 19:18:06 +02:00
25 lines
1.2 KiB
Markdown
25 lines
1.2 KiB
Markdown
### [CVE-2014-2383](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2383)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/DavidePastore/composer-audit
|
|
- https://github.com/H0j3n/EzpzCheatSheet
|
|
- https://github.com/Live-Hack-CVE/CVE-2014-2383
|
|
- https://github.com/Relativ3Pa1n/CVE-2014-2383-LFI-to-RCE-Escalation
|
|
- https://github.com/nhthongDfVn/File-Converter-Exploit
|
|
- https://github.com/violinist-dev/symfony-cloud-security-checker
|
|
|