Thecodingmachine

Gotenberg

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.04.2026 14:24:21
  • Zuletzt bearbeitet 14.04.2026 20:27:23

Gotenberg is an API for converting document formats. In 8.29.1 and earlier, Gotenberg uses dlclark/regexp2 to compile user-supplied scope patterns without setting a proper timeout. Users with access to features using this logic can hang workers indef...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 30.03.2026 20:14:32
  • Zuletzt bearbeitet 08.04.2026 15:57:06

Gotenberg is an API for converting document formats. Prior to version 8.29.0, the fix introduced for CVE-2024-21527 can be bypassed using mixed-case or uppercase URL schemes. This issue has been patched in version 8.29.0.

  • EPSS 0.31%
  • Veröffentlicht 26.08.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:02:46

It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint.

  • EPSS 0.53%
  • Veröffentlicht 26.08.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 05:02:46

An SSRF vulnerability in Gotenberg through 6.2.1 exists in the remote URL to PDF conversion, which results in a remote attacker being able to read local files or fetch intranet resources.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 26.02.2021 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:51:32

All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:/...

  • EPSS 0.39%
  • Veröffentlicht 07.01.2021 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:01:18

In Gotenberg through 6.2.1, insecure permissions for tini (writable by user gotenberg) potentially allow an attacker to overwrite the file, which can lead to denial of service or code execution.

Exploit
  • EPSS 0.65%
  • Veröffentlicht 07.01.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:17

A directory traversal vulnerability in the Markdown engine of Gotenberg through 6.2.1 allows an attacker to read any container files.

Exploit
  • EPSS 1.04%
  • Veröffentlicht 07.01.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:17

A directory traversal vulnerability in file upload function of Gotenberg through 6.2.1 allows an attacker to upload and overwrite any writable files outside the intended folder. This can lead to DoS, a change to program behavior, or code execution.

Exploit
  • EPSS 0.58%
  • Veröffentlicht 07.01.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:17

An incomplete-cleanup vulnerability in the Office rendering engine of Gotenberg through 6.2.1 allows an attacker to overwrite LibreOffice configuration files and execute arbitrary code via macros.