CVE-2024-37169
CVSS V2 None
CVSS V3 None
Description
@jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading.
Overview
- CVE ID
- CVE-2024-37169
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-06-10T21:35:38.198Z
- Last Modified Date
- 2024-06-10T21:35:38.198Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/jasonraimondi/url-to-png/security/advisories/GHSA-665w-mwrr-77q3 | x_refsource_CONFIRM |
https://github.com/jasonraimondi/url-to-png/issues/47 | x_refsource_MISC |
https://github.com/jasonraimondi/url-to-png/commit/9336020c5e603323f5cf4a2ac3bb9a7735cf61f7 | x_refsource_MISC |
https://github.com/jasonraimondi/url-to-png/releases/tag/v2.0.3 | x_refsource_MISC |
https://github.com/user-attachments/files/15536336/Arbitrary.File.Read.via.Playwright.s.Screenshot.Feature.Exploiting.File.Wrapper.pdf | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-37169 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37169 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 01:24:28 | Added to TrackCVE |