Medium severity4.3OSV Advisory· Published Jul 15, 2024· Updated Apr 15, 2026
CVE-2024-39918
CVE-2024-39918
Description
@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the ImageId in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@jmondi/url-to-pngnpm | < 2.1.2 | 2.1.2 |
Affected products
1- Range: 0.10.0, 0.10.1, 0.11.0, …
Patches
1e4eaeca6493bsanitize params
1 file changed · +1 −1
src/middlewares/extract_query_params.ts+1 −1 modified@@ -72,7 +72,7 @@ export function handleExtractQueryParamsMiddleware(encryptionService?: StringEnc const date = new Date(); const dateString = date.toLocaleDateString().replace(/\//g, "-"); - const imageId = dateString + "." + slugify(validData.url) + configToString(params); + const imageId = dateString + "." + slugify(validData.url) + slugify(configToString(params)); c.set("input", validData); c.set("imageId", imageId);
Vulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
6- github.com/advisories/GHSA-vvmv-wrvp-9gjrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-39918ghsaADVISORY
- github.com/jasonraimondi/url-to-png/blob/e43098e0af3a380ebc044e7f303a83933b94b434/src/middlewares/extract_query_params.tsnvdWEB
- github.com/jasonraimondi/url-to-png/commit/e4eaeca6493b21cd515b582fd6c0af09ede54507nvdWEB
- github.com/jasonraimondi/url-to-png/releases/tag/v2.1.2ghsaWEB
- github.com/jasonraimondi/url-to-png/security/advisories/GHSA-vvmv-wrvp-9gjrnvdWEB
News mentions
0No linked articles in our index yet.