Gotenberg.Convert.Markdown.CVE-2020-13449.Path.Traversal

description-logoDescription

This indicates an attack attempt to exploit a Path Traversal vulnerability in Gotenberg.
The vulnerability is due to insufficient sanitizing of user-supplied inputs. A remote, unauthenticated attacker can exploit this to read arbitrary files in the container by sending a crafted request. Successful exploitation could result in the disclosure of information that may be used to further compromise the system.

affected-products-logoAffected Products

Gotenberg up to 6.2.1

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/gotenberg/gotenberg/pull/208

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2025-05-13 32.006
Modified
Default_action:pass:drop
2025-05-01 32.000
New