cve/2024/CVE-2024-21547.md

19 lines
875 B
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-21547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21547)
![](https://img.shields.io/static/v1?label=Product&message=spatie%2Fbrowsershot&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Versions of the package spatie/browsershot before 5.0.2 are vulnerable to Directory Traversal due to URI normalisation in the browser where the file:// check can be bypassed with file:\\. An attacker could read any file on the server by exploiting the normalization of \ into /.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://gist.github.com/chuajianshen/baa71db588cfc038fb5d65624a47be81
2025-09-29 16:08:36 +00:00
- https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8501858
#### Github
No PoCs found on GitHub currently.