Description
Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7274 | Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol. |
Github GHSA |
GHSA-82h9-v8vh-mfpq | Browsershot vulnerable to Cross-Site Scripting (XSS) |
References
History
Wed, 03 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Browsershot 3.57.2 - Server Side XSS to LFR via HTML |
Tue, 29 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-12-03T20:05:20.438Z
Reserved: 2022-10-28T00:00:00.000Z
Link: CVE-2022-43983
Updated: 2024-08-03T13:47:04.601Z
Status : Modified
Published: 2022-11-25T17:15:10.897
Modified: 2025-04-29T15:15:50.410
Link: CVE-2022-43983
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA