Breaking mPDF with regex and logic
Hello! Earlier this year I found an interesting logic quirk in an open source library, 2025-11-12 23:24:6 Author: www.reddit.com(查看原文) 阅读量:2 收藏

Hello! Earlier this year I found an interesting logic quirk in an open source library, and now I wrote a medium article about it.

This is my first article ever, so any feedback is appreciated.

TLDR: mPDF is an open source PHP library for generating PDFs from HTML. Because of some logic quirks, it is possible to trigger web requests by providing it with a crafted input, even in cases where it is sanitized.

This post is not about a vulnerability! Just an unexpected behavior I found when researching an open source lib. (It was rejected by MITRE for a CVE)


文章来源: https://www.reddit.com/r/netsec/comments/1ovl2ke/breaking_mpdf_with_regex_and_logic/
如有侵权请联系:admin#unsafe.sh