8.2
CVE-2022-43984
- EPSS 0.15%
- Veröffentlicht 25.11.2022 17:15:10
- Zuletzt bearbeitet 29.04.2025 15:15:50
- Quelle help@fluidattacks.com
- CVE-Watchlists
- Unerledigt
Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Spatie ≫ Browsershot Version3.57.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.364 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.2 | 2.8 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.2 | 2.8 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.