Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-2383

EPSS 54.89% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-2383

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
dompdf 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
dompdf是一套HTML到PDF的转换工具。该工具采用样式驱动,支持下载并读取外部样式、整个样式标签和单个HTML元素的样式属性等。 dompdf 0.6.0:beta3及之前版本的dompdf.php文件中存在安全漏洞,当使用DOMPDF_ENABLE_PHP时,攻击者可借助PHP协议和‘input_file’参数利用该漏洞绕过改变根目录保护机制,读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-2383

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Relativ3Pa1n/CVE-2014-2383-LFI-to-RCE-EscalationPOC Details
2A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-2383.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-2383

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-04-28 · 14 CVEs total

CVE-2013-4285Gentoo patch for the PAM S/Key 模块信任管理漏洞
CVE-2014-0037Zarafa‘ValidateUserLogon’输入验证漏洞
CVE-2014-0079Zarafa 输入验证漏洞
CVE-2014-0187OpenStack Neutron 权限许可和访问控制漏洞
CVE-2014-1217Livetecs Timelive 权限许可和访问控制漏洞
CVE-2014-2042Livetecs Timelive 任意文件上传漏洞
CVE-2014-2657Apposite PaperCut MF 安全漏洞
CVE-2014-2658Apposite Papercut MF和NG安全漏洞
CVE-2014-2715Drupal VideoWhisper Webcam插件跨站脚本漏洞
CVE-2014-2846WD Arkeia virtual appliance 目录遍历漏洞
CVE-2014-2980GNUstep gdomap 输入验证漏洞
CVE-2014-2986Xen‘vgic_distr_mmio_write’函数输入验证漏洞
CVE-2014-3008Unitrends Enterprise Backup 操作系统命令注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-2383

No comments yet


Leave a comment