URI validation failure on SVG parsing in Dompdf
CVE-2023-23924
Key Information:
Badges
What is CVE-2023-23924?
Dompdf, an HTML to PDF conversion tool, has a vulnerability that allows URI validation to be bypassed in SVG parsing by using <image>
tags with uppercase letters. This issue affects version 2.0.1 and impacts PHP versions prior to 8.0.0, enabling attackers to exploit the vulnerability by providing a specially crafted SVG file. Successful exploitation could lead to arbitrary object unserialize, resulting in arbitrary file deletion or remote code execution, depending on the classes available in the environment.
Affected Version(s)
dompdf < 2.0.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
54% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved