@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the `ImageId` in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2427 @jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the `ImageId` in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Github GHSA Github GHSA GHSA-vvmv-wrvp-9gjr @jmondi/url-to-png contains a Path Traversal vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:33:11.660Z

Reserved: 2024-07-02T19:37:18.603Z

Link: CVE-2024-39918

cve-icon Vulnrichment

Updated: 2024-08-02T04:33:11.660Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-15T20:15:04.160

Modified: 2024-11-21T09:28:33.917

Link: CVE-2024-39918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.