@jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1941 | @jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading. |
Github GHSA |
GHSA-665w-mwrr-77q3 | Arbitrary file read via Playwright's screenshot feature exploiting file wrapper |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:50:55.256Z
Reserved: 2024-06-03T17:29:38.331Z
Link: CVE-2024-37169
Updated: 2024-08-02T03:50:55.256Z
Status : Awaiting Analysis
Published: 2024-06-10T22:15:12.663
Modified: 2024-11-21T09:23:21.103
Link: CVE-2024-37169
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA