Vulnerability Details CVE-2021-3838
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.052
EPSS Ranking 89.5%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2021-3838
-
cpe:2.3:a:dompdf_project:dompdf:-
-
cpe:2.3:a:dompdf_project:dompdf:0.5.2
-
cpe:2.3:a:dompdf_project:dompdf:0.6.0
-
cpe:2.3:a:dompdf_project:dompdf:0.6.1
-
cpe:2.3:a:dompdf_project:dompdf:0.6.2
-
cpe:2.3:a:dompdf_project:dompdf:0.7.0
-
cpe:2.3:a:dompdf_project:dompdf:0.8.0
-
cpe:2.3:a:dompdf_project:dompdf:0.8.1
-
cpe:2.3:a:dompdf_project:dompdf:0.8.2
-
cpe:2.3:a:dompdf_project:dompdf:0.8.3
-
cpe:2.3:a:dompdf_project:dompdf:0.8.4
-
cpe:2.3:a:dompdf_project:dompdf:0.8.5
-
cpe:2.3:a:dompdf_project:dompdf:0.8.6
-
cpe:2.3:a:dompdf_project:dompdf:1.0.0
-
cpe:2.3:a:dompdf_project:dompdf:1.0.1
-
cpe:2.3:a:dompdf_project:dompdf:1.0.2
-
cpe:2.3:a:dompdf_project:dompdf:1.1.0
-
cpe:2.3:a:dompdf_project:dompdf:1.1.1
-
cpe:2.3:a:dompdf_project:dompdf:1.2.1
-
cpe:2.3:a:dompdf_project:dompdf:1.2.2