CVE-2024-21527

July 19, 2024, 1:01 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

github.com/gotenberg/gotenberg/v8/pkg/gotenberg

  • before 8.1.0

github.com/gotenberg/gotenberg/v8/pkg/modules/chromium

  • before 8.1.0

github.com/gotenberg/gotenberg/v8/pkg/modules/webhook

  • before 8.1.0

Source

report@snyk.io

Tags

CVE-2024-21527 details

Published : July 19, 2024, 5:15 a.m.
Last Modified : July 19, 2024, 1:01 p.m.

Description

Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.

CVSS Score

1 2 3 4 5 6 7 8.2 9 10

Weakness

Weakness Name Description
CWE-918 Server-Side Request Forgery (SSRF) The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

Base Score

8.2

Exploitability Score

3.9

Impact Score

4.2

Base Severity

HIGH

This website uses the NVD API, but is not approved or certified by it.