
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-21544 affects versions of the package spatie/browsershot before 5.0.1. The vulnerability is classified as an Improper Input Validation issue discovered on December 11, 2024. The vulnerability exists in the URL validation mechanism through the setUrl method of the package, which is a library for converting webpages to images or PDFs using headless Chrome (Snyk Advisory).
The vulnerability stems from improper URL validation in the setUrl method. The security flaw allows attackers to bypass URL validation by using leading whitespace (%20) before the file:// protocol. The vulnerability has received a CVSS v3.1 base score of 8.6 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N, indicating a network-exploitable vulnerability requiring no privileges or user interaction (NVD).
When successfully exploited, this vulnerability leads to Local File Inclusion (LFI), enabling attackers to read sensitive files on the affected server. The impact primarily affects the confidentiality of the system, as it allows unauthorized access to local files that should not be accessible through the application (Snyk Advisory).
The recommended mitigation is to upgrade spatie/browsershot to version 5.0.1 or higher. The fix was implemented through a commit that ensures URLs with leading spaces are not accepted, specifically addressing the validation of file:// protocol URLs (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."