Miggo Logo

CVE-2023-24813: URI validation failure on SVG parsing. Bypass of CVE-2023-23924

10

CVSS Score
3.1

Basic Information

EPSS Score
0.90172%
Published
2/7/2023
Updated
2/24/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
dompdf/dompdfcomposer= 2.0.22.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the discrepancy between how Dompdf's Cache.php and php-svg-lib's Image.php handle SVG attributes. Dompdf's code (pre-patch) only validated the first non-empty attribute between 'xlink:href' and 'href', while php-svg-lib's code would ultimately use 'href' if both were present. The anonymous function in Cache.php failed to validate both attributes independently, allowing attackers to bypass security checks by exploiting this parsing inconsistency.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *u* to t** *i***r*n** in t** *ttri*ut* p*rs*r o* *omp** *n* p*p-sv*-li*, *n *tt**k*r **n still **ll *r*itr*ry URLs wit* *r*itr*ry proto*ols. ### **t*ils *omp** p*rs*s t** *r** *ttri*ut* o* `im***` t**s wit* t** *ollowin* *o**: [`sr*/Im*

Reasoning

T** vuln*r**ility st*ms *rom t** *is*r*p*n*y **tw**n *ow *omp**'s *****.p*p *n* p*p-sv*-li*'s Im***.p*p **n*l* SV* *ttri*ut*s. *omp**'s *o** (pr*-p*t**) only v*li**t** t** *irst non-*mpty *ttri*ut* **tw**n 'xlink:*r**' *n* '*r**', w*il* p*p-sv*-li*'s