dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
- https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/DavidePastore/composer-audit
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/Live-Hack-CVE/CVE-2014-2383
- https://github.com/Relativ3Pa1n/CVE-2014-2383-LFI-to-RCE-Escalation
- https://github.com/nhthongDfVn/File-Converter-Exploit
- https://github.com/violinist-dev/symfony-cloud-security-checker