CVE-2010-4879: DOMPDF Remote File Inclusion Vulnerability
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.86484%
CWE
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dompdf/dompdf | composer | >= 0.6, < 0.6.1 | 0.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from two key functions:
- getoptions() in dompdf.php lacked protocol checks for the 'input_file' parameter, enabling remote file inclusion. Attackers could supply URLs pointing to malicious PHP files.
- load_html() in dompdf.cls.php executed embedded PHP code via
eval
if 'enable_php' was enabled. Combined with remote file inclusion, this allowed code execution. The patch removed the PHP evaluation code and added protocol restrictions, confirming these functions' roles in the vulnerability.