CVE-2024-21549

Versions of the package spatie/browsershot before 5.0.3 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method. An attacker can exploit this vulnerability by utilizing view-source:file://, which allows for arbitrary file reading on a local file. **Note:** This is a bypass of the fix for [CVE-2024-21544](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496745).
Configurations

No configuration.

History

04 Feb 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.6
Summary
  • (es) Las versiones del paquete spatie/browsershot anteriores a la 5.0.3 son vulnerables a la validación de entrada incorrecta debido a la validación incorrecta de URL a través del método setUrl. Un atacante puede aprovechar esta vulnerabilidad utilizando view-source:file://, que permite la lectura arbitraria de archivos en un archivo local. **Nota:** Esta es una omisión de la corrección para [CVE-2024-21544](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496745).

20 Dec 2024, 17:15

Type Values Removed Values Added
CWE CWE-125

20 Dec 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-20 05:15

Updated : 2025-02-04 17:15


NVD link : CVE-2024-21549

Mitre link : CVE-2024-21549

CVE.ORG link : CVE-2024-21549


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-125

Out-of-bounds Read