Information Exposure Affecting @jmondi/url-to-png package, versions <2.1.2


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-JMONDIURLTOPNG-7456995
  • published16 Jul 2024
  • disclosed15 Jul 2024
  • creditrealArcherL

Introduced: 15 Jul 2024

CVE-2024-39919  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade @jmondi/url-to-png to version 2.1.2 or higher.

Overview

@jmondi/url-to-png is a Start with a url, end up with a png. The Module.

Affected versions of this package are vulnerable to Information Exposure which includes an ALLOW_LIST where the host can specify which services the user is permitted to capture screenshots of. An attacker can capture screenshots of local web services by exploiting the lack of restrictions on localhost.

Note: This is marked as a LOW since the maintainer is not sure if this is a vulnerability.

References

CVSS Scores

version 4.0
version 3.1