CVE-2020-14161
- EPSS 0.31%
- Veröffentlicht 26.08.2021 11:15:09
- Zuletzt bearbeitet 21.11.2024 05:02:46
It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint.
CVE-2020-14160
- EPSS 0.53%
- Veröffentlicht 26.08.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 05:02:46
An SSRF vulnerability in Gotenberg through 6.2.1 exists in the remote URL to PDF conversion, which results in a remote attacker being able to read local files or fetch intranet resources.
CVE-2021-23345
- EPSS 0.21%
- Veröffentlicht 26.02.2021 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:51:32
All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:/...
CVE-2020-13452
- EPSS 0.39%
- Veröffentlicht 07.01.2021 22:15:11
- Zuletzt bearbeitet 21.11.2024 05:01:18
In Gotenberg through 6.2.1, insecure permissions for tini (writable by user gotenberg) potentially allow an attacker to overwrite the file, which can lead to denial of service or code execution.
CVE-2020-13449
- EPSS 0.65%
- Veröffentlicht 07.01.2021 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:01:17
A directory traversal vulnerability in the Markdown engine of Gotenberg through 6.2.1 allows an attacker to read any container files.
CVE-2020-13450
- EPSS 1.04%
- Veröffentlicht 07.01.2021 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:01:17
A directory traversal vulnerability in file upload function of Gotenberg through 6.2.1 allows an attacker to upload and overwrite any writable files outside the intended folder. This can lead to DoS, a change to program behavior, or code execution.
CVE-2020-13451
- EPSS 0.58%
- Veröffentlicht 07.01.2021 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:01:17
An incomplete-cleanup vulnerability in the Office rendering engine of Gotenberg through 6.2.1 allows an attacker to overwrite LibreOffice configuration files and execute arbitrary code via macros.