Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7259 | Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol. |
Github GHSA |
GHSA-6q49-35h6-rq2p | Browsershot version 3.57.3 vulnerable to improper input validation |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 29 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-04-29T14:37:41.012Z
Reserved: 2022-10-28T00:00:00.000Z
Link: CVE-2022-43984
Updated: 2024-08-03T13:47:04.589Z
Status : Modified
Published: 2022-11-25T17:15:10.950
Modified: 2025-04-29T15:15:50.567
Link: CVE-2022-43984
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA