We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21527



Assignersnyk
Reserved2023-12-22
Published2024-07-19
Updated2024-09-05

Description

Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.



HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P

Problem types

Server-side Request Forgery (SSRF)

Product status

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Credits

Filip Ochnik

References

https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081

https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082

https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083

https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0

https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794

https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356

cve.org CVE-2024-21527

nvd.nist.gov CVE-2024-21527

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-21527
Subscribe to our newsletter to learn more about our work.