logo

CVE-2019-17221 phantomjs

Package

Manager: npm
Name: phantomjs
Vulnerable Version: >=0 <=2.1.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.08713 pctl0.92145

Details

PhantomJS Arbitrary File Read PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a `file://` URI. The vulnerability exists in the `page.open()` function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if `page.render()` is the function callback, this generates a PDF or an image of the targeted file. **NOTE**: this product is no longer developed.

Metadata

Created: 2022-05-24T22:01:03Z
Modified: 2023-10-19T18:55:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x43g-gj9x-838x/GHSA-x43g-gj9x-838x.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-x43g-gj9x-838x
Finding: F123
Auto approve: 1