Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vx9w-5cx4-9796

Опубликовано: 16 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.6

Описание

Crawl4AI Has Local File Inclusion in Docker API via file:// URLs

A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.

Attack Vector:

POST /execute_js { "url": "file:///etc/passwd", "scripts": ["document.body.innerText"] }

Impact

An unauthenticated attacker can:

  • Read sensitive files (/etc/passwd, /etc/shadow, application configs)
  • Access environment variables via /proc/self/environ
  • Discover internal application structure
  • Potentially read credentials and API keys

Workarounds

  1. Disable the Docker API
  2. Add authentication to the API
  3. Use network-level filtering

Пакеты

Наименование

Crawl4AI

pip
Затронутые версииВерсия исправления

< 0.8.0

0.8.0

8.6 High

CVSS3

Дефекты

CWE-22

8.6 High

CVSS3

Дефекты

CWE-22