CVE-2024-39918

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-39918
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39918.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-39918
Aliases
Related
Published
2024-07-15T20:15:04Z
Modified
2025-01-08T16:15:17.548607Z
Summary
[none]
Details

@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the ImageId in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/jasonraimondi/url-to-png

Affected ranges

Type
GIT
Repo
https://github.com/jasonraimondi/url-to-png
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.12.0
0.12.0-rc1
0.12.0-rc2
0.12.1
0.12.2
0.9.0

v0.*

v0.12.3

v1.*

v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.3.1
v1.3.1-rc.0
v1.3.1-rc.1
v1.3.1-rc.2
v1.3.2
v1.3.2-rc.0
v1.3.3
v1.4.0
v1.4.1
v1.4.2
v1.5.0

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.1.0
v2.1.1