Description
Versions of the package spatie/browsershot before 5.0.1 are vulnerable to Improper Input Validation due to improper URL validation in the setUrl method. An attacker can exploit this vulnerability by using leading whitespace (%20) before the file:// protocol, resulting in Local File Inclusion, which allows the attacker to read sensitive files on the server.
Problem types
Credits
Muhammad Firdaus Amran
References
security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496745
github.com/...1b9977d8df570c67/src/Browsershot.php#L258-L269
github.com/...ommit/fae8396641b961f62bd756920b14f01a4391296e