GHSA-x43g-gj9x-838x

Suggest an improvement
Source
https://github.com/advisories/GHSA-x43g-gj9x-838x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x43g-gj9x-838x/GHSA-x43g-gj9x-838x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x43g-gj9x-838x
Aliases
Published
2022-05-24T22:01:03Z
Modified
2023-11-08T04:01:23.069081Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
PhantomJS Arbitrary File Read
Details

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.

Database specific
{
    "github_reviewed_at": "2023-10-19T18:55:53Z",
    "cwe_ids": [
        "CWE-552"
    ],
    "nvd_published_at": "2019-11-05T14:15:00Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / phantomjs

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.1.1