Gotenberg vulnerable to Server-side Request Forgery (SSRF) via /convert/html endpoint
CVE-2024-21527

8.2HIGH

What is CVE-2024-21527?

Multiple versions of the Gotenberg package prior to 8.1.0 contain a server-side request forgery (SSRF) vulnerability that can be exploited through the /convert/html endpoint. An attacker can issue a request to a file residing on localhost, leading to potential local file inclusion. This vulnerability allows unauthorized access to sensitive files on the host system. To mitigate this risk, users are advised to leverage the --chromium-deny-list and --chromium-allow-list flags.

Affected Version(s)

github.com/gotenberg/gotenberg/v8/pkg/gotenberg 0 < 8.1.0

github.com/gotenberg/gotenberg/v8/pkg/modules/chromium 0 < 8.1.0

github.com/gotenberg/gotenberg/v8/pkg/modules/webhook 0 < 8.1.0

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Filip Ochnik
.