Bypass for CVE-2024-21544 #906
Closed
nightfury99
started this conversation in
Bugs
Replies: 2 comments
-
|
This has been fixed in 5.0.3 |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
a |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Browsershot version 5.0.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method.
Vulnerability
Affected versions (5.0.2) of this package are vulnerable to Improper Input Validation due to incorrect URL validation via the setUrl method. This is a workaround for previously patched CVE (CVE-2024-21544) by utilizing 'view-source:file://', which allows for arbitrary file reading on a local file.
Below is affected code: https://github.com/spatie/browsershot/blob/main/src/Browsershot.php#L260C1-L268C10
Exploit
index.php./etc/passwd.References
Beta Was this translation helpful? Give feedback.
All reactions