@jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1941 @jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading.
Github GHSA Github GHSA GHSA-665w-mwrr-77q3 Arbitrary file read via Playwright's screenshot feature exploiting file wrapper
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T03:50:55.256Z

Reserved: 2024-06-03T17:29:38.331Z

Link: CVE-2024-37169

cve-icon Vulnrichment

Updated: 2024-08-02T03:50:55.256Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-10T22:15:12.663

Modified: 2024-11-21T09:23:21.103

Link: CVE-2024-37169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses