Miggo Logo

CVE-2010-4879: DOMPDF Remote File Inclusion Vulnerability

7.5

CVSS Score

Basic Information

EPSS Score
0.86484%
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
dompdf/dompdfcomposer>= 0.6, < 0.6.10.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises from two key functions:

  1. getoptions() in dompdf.php lacked protocol checks for the 'input_file' parameter, enabling remote file inclusion. Attackers could supply URLs pointing to malicious PHP files.
  2. load_html() in dompdf.cls.php executed embedded PHP code via eval if 'enable_php' was enabled. Combined with remote file inclusion, this allowed code execution. The patch removed the PHP evaluation code and added protocol restrictions, confirming these functions' roles in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

P*P r*mot* *il* in*lusion vuln*r**ility in *omp**.p*p in *omp** *.*.* **t** *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry P*P *o** vi* * URL in t** `input_*il*` p*r*m*t*r.

Reasoning

T** vuln*r**ility *ris*s *rom two k*y *un*tions: *. ****toptions()** in *omp**.p*p l**k** proto*ol ****ks *or t** 'input_*il*' p*r*m*t*r, *n**lin* r*mot* *il* in*lusion. *tt**k*rs *oul* supply URLs pointin* to m*li*ious P*P *il*s. *. **lo**_*tml()**