{"id":"CVE-2024-21527","details":"Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as \u003ciframe src=\"\\\\localhost/etc/passwd\"\u003e. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system.\r\r Workaround\rAn alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.","aliases":["GO-2024-2996"],"modified":"2026-04-10T05:09:34.231373Z","published":"2024-07-19T05:15:10.053Z","references":[{"type":"WEB","url":"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081"},{"type":"WEB","url":"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082"},{"type":"WEB","url":"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083"},{"type":"WEB","url":"https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356"},{"type":"WEB","url":"https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0"},{"type":"FIX","url":"https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gotenberg/gotenberg","events":[{"introduced":"0"},{"fixed":"25ce0b9aeeeffa79542e575f10d4133c487acf8a"},{"introduced":"0"},{"fixed":"25ce0b9aeeeffa79542e575f10d4133c487acf8a"},{"introduced":"0"},{"fixed":"25ce0b9aeeeffa79542e575f10d4133c487acf8a"},{"fixed":"ad152e62e5124b673099a9103eb6e7f933771794"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"8.1.0"},{"introduced":"0"},{"fixed":"8.1.0"},{"introduced":"0"},{"fixed":"8.1.0"}]}}],"versions":["1.0.0","2.0.0","3.0.0","3.0.1","3.0.2","3.1.0","3.1.1","3.1.2","3.2.0","4.0.0","4.1.0","4.2.0","4.3.0","4.4.0","5.0.0","5.0.1","5.0.2","5.1.0","6.0.0","6.0.1","6.0.2","6.0.3","6.0.4","6.1.0","6.1.1","6.1.2","6.2.0","6.2.1","6.3.0","6.3.1","6.4.0","6.4.1","6.4.2","6.4.3","6.4.4","v7.0.0","v7.0.1","v7.0.2","v7.0.3","v7.0.4","v7.0.5","v7.0.6","v7.0.7","v7.1.0","v7.1.1","v7.10.0","v7.10.1","v7.2.0","v7.3.0","v7.3.1","v7.4.0","v7.4.1","v7.4.2","v7.4.3","v7.5.0","v7.5.1","v7.5.2","v7.5.3","v7.5.4","v7.6.0","v7.6.1","v7.6.2","v7.7.0","v7.7.1","v7.7.2","v7.8.0","v7.8.1","v7.8.2","v7.8.3","v7.9.0","v7.9.1","v7.9.2","v8.0.0","v8.0.1","v8.0.2","v8.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21527.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}]}