First published: Mon Jul 18 2022(Updated: )
External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php-dompdf | <=0.6.2+dfsg-3<=0.6.2+dfsg-3.1 | 0.6.2+dfsg-3+deb10u2 2.0.3+dfsg-1 2.0.4+dfsg-1 |
ubuntu/php-dompdf | <2.0.0 | 2.0.0 |
ubuntu/php-dompdf | <0.6.1+dfsg-2ubuntu1+ | 0.6.1+dfsg-2ubuntu1+ |
ubuntu/php-dompdf | <0.6.2+dfsg-3.1ubuntu0.1 | 0.6.2+dfsg-3.1ubuntu0.1 |
ubuntu/php-dompdf | <0.6.2+dfsg-3ubuntu0.18.04.1~ | 0.6.2+dfsg-3ubuntu0.18.04.1~ |
ubuntu/php-dompdf | <0.6.2+dfsg-3ubuntu0.20.04.1 | 0.6.2+dfsg-3ubuntu0.20.04.1 |
Dompdf | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2400 is a vulnerability that allows an attacker to control the file name or path in the GitHub repository dompdf/dompdf prior to version 2.0.0.
Versions 0.6.2+dfsg-3+deb10u2, 2.0.3+dfsg-1, and 2.0.3+dfsg-3 of the debian/php-dompdf package are affected. Version 2.0.0 of the ubuntu/php-dompdf package is also affected.
To fix CVE-2022-2400 in debian/php-dompdf, update to version 0.6.2+dfsg-3.1 or later.
To fix CVE-2022-2400 in ubuntu/php-dompdf, update to version 2.0.0 or later.
More information about CVE-2022-2400 can be found in the references: [link1](https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a), [link2](https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a), [link3](https://lists.debian.org/debian-lts-announce/2023/07/msg00017.html).