7.5
CVSSv3

CVE-2020-13449

Published: 07/01/2021 Updated: 08/01/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A directory traversal vulnerability in the Markdown engine of Gotenberg up to and including 6.2.1 allows an malicious user to read any container files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thecodingmachine gotenberg

Exploits

Gotenberg versions 620 and below suffer from directory traversal, code execution, and insecure permission vulnerabilities ...

Github Repositories

PoC code for exploiting Gotenberg 2020 vulnerabilities Refer to CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452: sploittech/2020/12/29/Gotenberghtml Write-up: Instructions Run gotenberg version 620 or earlier: $ docker run --rm -p 3000:3000 --name gotenberg thecodingmachine/gotenberg:620 Execute the exploit