cve/2023/CVE-2023-50252.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-50252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50252)
![](https://img.shields.io/static/v1?label=Product&message=php-svg-lib&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.5.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue.
### POC
#### Reference
- https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr
#### Github
No PoCs found on GitHub currently.