PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5707 PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.
Github GHSA Github GHSA GHSA-x43g-gj9x-838x PhantomJS Arbitrary File Read
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:33:17.356Z

Reserved: 2019-10-06T00:00:00

Link: CVE-2019-17221

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-05T14:15:13.537

Modified: 2024-11-21T04:31:53.447

Link: CVE-2019-17221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses