9.8
CVSSv3

CVE-2020-13450

Published: 07/01/2021 Updated: 08/01/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A directory traversal vulnerability in file upload function of Gotenberg up to and including 6.2.1 allows an malicious user to upload and overwrite any writable files outside the intended folder. This can lead to DoS, a change to program behavior, or code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thecodingmachine gotenberg

Exploits

Gotenberg versions 620 and below suffer from directory traversal, code execution, and insecure permission vulnerabilities ...

Github Repositories

PoC code for exploiting Gotenberg 2020 vulnerabilities Refer to CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452: sploittech/2020/12/29/Gotenberghtml Write-up: Instructions Run gotenberg version 620 or earlier: $ docker run --rm -p 3000:3000 --name gotenberg thecodingmachine/gotenberg:620 Execute the exploit