We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.
Reserved 2023-12-22 | Published 2024-07-19 | Updated 2024-09-05 | Assigner snykServer-side Request Forgery (SSRF)
Filip Ochnik
security.snyk.io/...GOTENBERGGOTENBERGV8PKGGOTENBERG-7537081
security.snyk.io/...ERGGOTENBERGV8PKGMODULESCHROMIUM-7537082
security.snyk.io/...BERGGOTENBERGV8PKGMODULESWEBHOOK-7537083
github.com/gotenberg/gotenberg/releases/tag/v8.1.0
github.com/...ommit/ad152e62e5124b673099a9103eb6e7f933771794
gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356
Support options