{"id":"USN-6277-1","summary":"php-dompdf vulnerabilities","details":"It was discovered that Dompdf was not properly validating untrusted input when\nprocessing HTML content under certain circumstances. An attacker could\npossibly use this issue to expose sensitive information or execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS.\n(CVE-2014-5011, CVE-2014-5012, CVE-2014-5013)\n\nIt was discovered that Dompdf was not properly validating processed HTML\ncontent that referenced PHAR files, which could result in the deserialization\nof untrusted data. An attacker could possibly use this issue to execute\narbitrary code. (CVE-2021-3838)\n\nIt was discovered that Dompdf was not properly validating processed HTML\ncontent that referenced both a remote base and a local file, which could\nresult in the bypass of a chroot check. An attacker could possibly use this\nissue to expose sensitive information. (CVE-2022-2400)\n","modified":"2026-02-10T04:43:14Z","published":"2023-08-08T14:10:26Z","related":["UBUNTU-CVE-2014-5011","UBUNTU-CVE-2014-5012","UBUNTU-CVE-2014-5013","UBUNTU-CVE-2021-3838","UBUNTU-CVE-2022-2400"],"upstream":["CVE-2014-5011","CVE-2014-5012","CVE-2014-5013","CVE-2021-3838","CVE-2022-2400","UBUNTU-CVE-2014-5011","UBUNTU-CVE-2014-5012","UBUNTU-CVE-2014-5013","UBUNTU-CVE-2021-3838","UBUNTU-CVE-2022-2400"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6277-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-5011"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-5012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-5013"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3838"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2400"}],"affected":[{"package":{"name":"php-dompdf","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/php-dompdf@0.6.1+dfsg-2ubuntu1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.1+dfsg-2ubuntu1+esm1"}]}],"versions":["0.6.1+dfsg-2","0.6.1+dfsg-2build1","0.6.1+dfsg-2ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"php-dompdf","binary_version":"0.6.1+dfsg-2ubuntu1+esm1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-5011"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-5012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-5013"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3838"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2400"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6277-1.json"}},{"package":{"name":"php-dompdf","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/php-dompdf@0.6.2+dfsg-3ubuntu0.18.04.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.2+dfsg-3ubuntu0.18.04.1~esm1"}]}],"versions":["0.6.2+dfsg-3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"php-dompdf","binary_version":"0.6.2+dfsg-3ubuntu0.18.04.1~esm1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3838"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2400"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6277-1.json"}},{"package":{"name":"php-dompdf","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/php-dompdf@0.6.2+dfsg-3ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.2+dfsg-3ubuntu0.20.04.1"}]}],"versions":["0.6.2+dfsg-3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"php-dompdf","binary_version":"0.6.2+dfsg-3ubuntu0.20.04.1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3838"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2400"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6277-1.json"}}],"schema_version":"1.7.3"}