Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Gotenberg vulnerable to argument injection via newlines in ExifTool metadata values
Vulnerability Description
Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
Vulnerability Type
参数注入或修改
Vulnerability Title
Gotenberg 参数注入漏洞
Vulnerability Description
Gotenberg是Gotenberg开源的一个开发人员友好的 API。用于将多种文档格式转换为 PDF 文件。 Gotenberg 8.30.1及之前版本存在参数注入漏洞,该漏洞源于元数据写入端点未对元数据值进行清理,可能导致未经身份验证的攻击者通过换行符注入任意ExifTool伪标签,重命名或移动PDF文件、覆盖任意文件或创建符号链接和硬链接。
CVSS Information
N/A
Vulnerability Type
N/A