This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.
References
Link | Resource |
---|---|
https://github.com/spatie/browsershot/issues/441%23issue-735049731 | Broken Link |
https://snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-1037064 | Third Party Advisory |
https://github.com/spatie/browsershot/issues/441%23issue-735049731 | Broken Link |
https://snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-1037064 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/spatie/browsershot/issues/441%23issue-735049731 - Broken Link | |
References | () https://snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-1037064 - Third Party Advisory |
Information
Published : 2020-12-11 11:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7790
Mitre link : CVE-2020-7790
CVE.ORG link : CVE-2020-7790
JSON object : View
Products Affected
spatie
- browsershot
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')