Gotenberg.File.Upload.Path.Traversal
Description
This indicates an attack attempt to exploit a Path Traversal vulnerability in Gotenberg 6.2.1.
The vulnerability is due to improper sanitization of user-supplied inputs. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the server. Successfully exploiting this vulnerability could result in uploading or overwriting files outside of the intended folder.
Affected Products
Gotenberg 6.2.1 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch, available from the website.
https://github.com/gotenberg/gotenberg/pull/208
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |