Skip to content

x/vulndb: potential Go vuln in github.com/gotenberg/gotenberg: CVE-2024-21527 #2996

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue Jul 19, 2024 · 2 comments
Labels

Comments

@GoVulnBot
Copy link

Advisory CVE-2024-21527 references a vulnerability in the following Go modules:

Module
github.com/gotenberg/gotenberg

Description:
Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src="\\localhost/etc/passwd">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system.

Workaround
An al...

References:

Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/gotenberg/gotenberg
summary: CVE-2024-21527 in github.com/gotenberg/gotenberg
cves:
    - CVE-2024-21527
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21527
    - fix: https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794
    - web: https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356
    - web: https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0
    - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081
    - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082
    - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083
notes:
    - fix: 'github.com/gotenberg/gotenberg: could not add vulnerable_at: module github.com/gotenberg/gotenberg not known to proxy'
source:
    id: CVE-2024-21527
    created: 2024-07-19T06:01:11.0161752Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/599636 mentions this issue: data/reports: add 4 unreviewed reports

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/600479 mentions this issue: data/reports: regenerate GO-2024-2996

gopherbot pushed a commit that referenced this issue Jul 29, 2024
GO-2024-2996 can now be generated correctly automatically.
Remove the note to reflect this.

  - data/reports/GO-2024-2996.yaml

Updates #2996

Change-Id: I01c75d567d0631e7268a664525a5a3b834061bcb
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/600479
Reviewed-by: Damien Neil <[email protected]>
LUCI-TryBot-Result: Go LUCI <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants