CVE-2024-25117 Affecting php-dompdf-svg-lib package, versions <0.5.2-1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-PHPDOMPDFSVGLIB-6261485
  • published22 Feb 2024
  • disclosed21 Feb 2024

Introduced: 21 Feb 2024

CVE-2024-25117  (opens in a new tab)

How to fix?

Upgrade Debian:13 php-dompdf-svg-lib to version 0.5.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-dompdf-svg-lib package and not the php-dompdf-svg-lib package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The Style::fromAttributes(), or the Style::parseCssStyle() should check the content of the font-family and prevents it to use a PHAR url, to avoid passing an invalid and dangerous fontName value to other libraries. The same check as done in the Style::fromStyleSheets might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the fontName that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.