Bypass for CVE-2024-21544 #906
Closed
nightfury99
started this conversation in
Bugs
Replies: 1 comment
-
This has been fixed in 5.0.3 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
Browsershot version 5.0.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method.
Vulnerability
Affected versions (5.0.2) of this package are vulnerable to Improper Input Validation due to incorrect URL validation via the setUrl method. This is a workaround for previously patched CVE (CVE-2024-21544) by utilizing 'view-source:file://', which allows for arbitrary file reading on a local file.
Below is affected code: https://github.com/spatie/browsershot/blob/main/src/Browsershot.php#L260C1-L268C10
Exploit
index.php
./etc/passwd
.References
Beta Was this translation helpful? Give feedback.
All reactions