CVE-2024-21527 PUBLISHED CVSS 8.199999809265137 HIGH

Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system. Workaround An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.

EPSS 0.12% · 31.2th percentile

Risk Scores

CVSS v3.1
8.199999809265137
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P
EPSS Score
0.12%
31.2th percentile

Affected Products

VendorProductVersions
n/agithub.com/gotenberg/gotenberg/v8/pkg/modules/chromium0
gotenberggotenberg0
n/agithub.com/gotenberg/gotenberg/v8/pkg/modules/webhook0
n/agithub.com/gotenberg/gotenberg/v8/pkg/gotenberg0

Timeline

References

Open in Interactive Console →