### [CVE-2024-21547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21547) ![](https://img.shields.io/static/v1?label=Product&message=spatie%2Fbrowsershot&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brightgreen) ### Description Versions of the package spatie/browsershot before 5.0.2 are vulnerable to Directory Traversal due to URI normalisation in the browser where the file:// check can be bypassed with file:\\. An attacker could read any file on the server by exploiting the normalization of \ into /. ### POC #### Reference - https://gist.github.com/chuajianshen/baa71db588cfc038fb5d65624a47be81 - https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8501858 #### Github No PoCs found on GitHub currently.