CVE-2014-2383
Published: 28 April 2014
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
Priority
Status
Package | Release | Status |
---|---|---|
php-dompdf Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(0.6.1+dfsg-2)
|
bionic |
Not vulnerable
(0.6.1+dfsg-2)
|
|
cosmic |
Not vulnerable
(0.6.1+dfsg-2)
|
|
disco |
Not vulnerable
(0.6.1+dfsg-2)
|
|
lucid |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
saucy |
Does not exist
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.6.1+dfsg-2)
|
|
utopic |
Not vulnerable
(0.6.1+dfsg-2)
|
|
vivid |
Not vulnerable
(0.6.1+dfsg-2)
|
|
wily |
Not vulnerable
(0.6.1+dfsg-2)
|
|
xenial |
Not vulnerable
(0.6.1+dfsg-2)
|
|
yakkety |
Not vulnerable
(0.6.1+dfsg-2)
|
|
zesty |
Not vulnerable
(0.6.1+dfsg-2)
|