We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21527



Description

Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.

Reserved 2023-12-22 | Published 2024-07-19 | Updated 2024-09-05 | Assigner snyk


HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P

Problem types

Server-side Request Forgery (SSRF)

Product status

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Any version before 8.1.0
affected

Credits

Filip Ochnik

References

security.snyk.io/...GOTENBERGGOTENBERGV8PKGGOTENBERG-7537081

security.snyk.io/...ERGGOTENBERGV8PKGMODULESCHROMIUM-7537082

security.snyk.io/...BERGGOTENBERGV8PKGMODULESWEBHOOK-7537083

github.com/gotenberg/gotenberg/releases/tag/v8.1.0

github.com/...ommit/ad152e62e5124b673099a9103eb6e7f933771794

gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356

cve.org (CVE-2024-21527)

nvd.nist.gov (CVE-2024-21527)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-21527

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.