Description
Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.
Problem types
Server-side Request Forgery (SSRF)
Product status
Credits
Filip Ochnik
References
security.snyk.io/...GOTENBERGGOTENBERGV8PKGGOTENBERG-7537081
security.snyk.io/...ERGGOTENBERGV8PKGMODULESCHROMIUM-7537082
security.snyk.io/...BERGGOTENBERGV8PKGMODULESWEBHOOK-7537083
github.com/gotenberg/gotenberg/releases/tag/v8.1.0
github.com/...ommit/ad152e62e5124b673099a9103eb6e7f933771794
gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356