An SSRF vulnerability in Gotenberg through 6.2.1 exists in the remote URL to PDF conversion, which results in a remote attacker being able to read local files or fetch intranet resources.
References
Link | Resource |
---|---|
https://github.com/gotenberg/gotenberg/issues/215 | Issue Tracking Third Party Advisory |
https://github.com/gotenberg/gotenberg/pull/319 | Patch Third Party Advisory |
https://github.com/thecodingmachine/gotenberg/releases | Release Notes Third Party Advisory |
https://github.com/gotenberg/gotenberg/issues/215 | Issue Tracking Third Party Advisory |
https://github.com/gotenberg/gotenberg/pull/319 | Patch Third Party Advisory |
https://github.com/thecodingmachine/gotenberg/releases | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gotenberg/gotenberg/issues/215 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/gotenberg/gotenberg/pull/319 - Patch, Third Party Advisory | |
References | () https://github.com/thecodingmachine/gotenberg/releases - Release Notes, Third Party Advisory |
Information
Published : 2021-08-26 11:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14160
Mitre link : CVE-2020-14160
CVE.ORG link : CVE-2020-14160
JSON object : View
Products Affected
thecodingmachine
- gotenberg
CWE
CWE-918
Server-Side Request Forgery (SSRF)