cve/2024/CVE-2024-21527.md
2024-07-25 21:25:12 +00:00

22 lines
1.7 KiB
Markdown

### [CVE-2024-21527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21527)
![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fgotenberg&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fmodules%2Fchromium&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fmodules%2Fwebhook&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.1.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Server-side%20Request%20Forgery%20(SSRF)&color=brighgreen)
### Description
Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system.
Workaround
An alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083
#### Github
No PoCs found on GitHub currently.