@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the `ImageId` in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2427 | @jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the `ImageId` in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-vvmv-wrvp-9gjr | @jmondi/url-to-png contains a Path Traversal vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T04:33:11.660Z
Reserved: 2024-07-02T19:37:18.603Z
Link: CVE-2024-39918
Updated: 2024-08-02T04:33:11.660Z
Status : Awaiting Analysis
Published: 2024-07-15T20:15:04.160
Modified: 2024-11-21T09:28:33.917
Link: CVE-2024-39918
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA