Home

Description

Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.

PUBLISHED Reserved 2023-12-22 | Published 2024-07-19 | Updated 2024-09-05 | Assigner snyk




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P

Problem types

Server-side Request Forgery (SSRF)

Product status

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Credits

Filip Ochnik

References

security.snyk.io/...GOTENBERGGOTENBERGV8PKGGOTENBERG-7537081

security.snyk.io/...ERGGOTENBERGV8PKGMODULESCHROMIUM-7537082

security.snyk.io/...BERGGOTENBERGV8PKGMODULESWEBHOOK-7537083

github.com/gotenberg/gotenberg/releases/tag/v8.1.0

github.com/...ommit/ad152e62e5124b673099a9103eb6e7f933771794

gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356

cve.org (CVE-2024-21527)

nvd.nist.gov (CVE-2024-21527)

Download JSON