Описание
Gotenberg has Chromium deny-list bypass via case-insensitive URL scheme (bypass of GHSA-rh2x-ccvw-q7r3)
Impact
The fix introduced in version 8.1.0 for GHSA-rh2x-ccvw-q7r3 (CVE-2024-21527) can be bypassed using mixed-case or uppercase URL schemes.
The default --chromium-deny-list value is ^file:(?!//\/tmp/).*. This regex is anchored to lowercase file: at the start. However, per RFC 3986 Section 3.1, URI schemes are case-insensitive. Chromium normalizes the scheme to lowercase before navigation, so a URL like FILE:///etc/passwd or File:///etc/passwd bypasses the deny-list check but still gets resolved by Chromium as file:///etc/passwd.
The root cause is in pkg/gotenberg/filter.go — the FilterDeadline function compiles the deny-list regex with regexp2.MustCompile(denied.String(), 0), where 0 means no flags (case-sensitive). Since the regex pattern itself doesn't include a (?i) flag, matching is strictly case-sensitive.
This affects both the URL endpoint and HTML conversion (via iframes, link tags, etc.).
Steps to Reproduce
- Start Gotenberg with default settings:
- Read
/etc/passwdvia the URL endpoint using an uppercase scheme:
-
Open
output.pdf— it contains the contents of/etc/passwd. -
Alternatively, create an
index.html:
Then convert it:
- The resulting PDF contains
/etc/passwdcontents.
Mixed-case variants like File:, fILE:, fiLE: etc. all work as well.
Root Cause
pkg/modules/chromium/chromium.godefines the default deny-list as^file:(?!//\/tmp/).*pkg/gotenberg/filter.gocompiles this withregexp2.MustCompile(denied.String(), 0)— flag0means case-sensitivepkg/modules/chromium/events.gousesFilterDeadlineto check intercepted request URLs against the deny-list- Chromium normalizes URL schemes to lowercase, so
FILE:///etc/passwdbecomesfile:///etc/passwdafter the deny-list check has already passed
Suggested Fix
Change the default deny-list regex to use a case-insensitive flag:
Or apply case-insensitive matching in FilterDeadline when compiling the regex.
Severity
This is effectively the same impact as CVE-2024-21527 — unauthenticated arbitrary file read from the Gotenberg container. An attacker can leak environment variables, configuration, credentials, and other sensitive data.
Ссылки
- https://github.com/gotenberg/gotenberg/security/advisories/GHSA-jjwv-57xh-xr6r
- https://github.com/gotenberg/gotenberg/security/advisories/GHSA-rh2x-ccvw-q7r3
- https://github.com/gotenberg/gotenberg/commit/06b2b2e10c52b58135edbfe82e94d599eb0c5a11
- https://github.com/gotenberg/gotenberg/commit/8625a4e899eb75e6fcf46d28394334c7fd79fff5
- https://github.com/gotenberg/gotenberg/releases/tag/v8.29.0
Пакеты
github.com/gotenberg/gotenberg/v8
< 8.29.0
8.29.0