PhantomJS Arbitrary File Read
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Oct 19, 2023
Description
Published by the National Vulnerability Database
Nov 5, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Oct 19, 2023
Last updated
Oct 19, 2023
PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a
file://
URI. The vulnerability exists in thepage.open()
function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, ifpage.render()
is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.References