Description
Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7259 | Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol. |
Github GHSA |
GHSA-6q49-35h6-rq2p | Browsershot version 3.57.3 vulnerable to improper input validation |
References
History
Wed, 03 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Browsershot 3.57.3 - Server Side XSS to LFR via HTML |
Tue, 29 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-12-03T20:10:14.883Z
Reserved: 2022-10-28T00:00:00.000Z
Link: CVE-2022-43984
Updated: 2024-08-03T13:47:04.589Z
Status : Modified
Published: 2022-11-25T17:15:10.950
Modified: 2025-04-29T15:15:50.567
Link: CVE-2022-43984
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA