Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(security): require screenshot protocol to be http/https #48

Merged

Conversation

jasonraimondi
Copy link
Owner

prevent file:// URI scheme in Playwright screenshots

resolves #47

prevent file:// URI scheme in Playwright screenshots

A critical vulnerability was discovered in a web application feature that utilizes
Playwright's screenshot capability. Attackers could exploit this vulnerability by
using the file:// URI scheme to read arbitrary files on the server's filesystem,
potentially exposing sensitive information, such as AWS credentials.

This commit addresses the vulnerability by implementing proper input validation
and sanitization to prevent the use of the file:// URI scheme in Playwright
screenshot requests, mitigating the risk of unauthorized file access.

resolves #47
@jasonraimondi jasonraimondi merged commit 9336020 into main Jun 4, 2024
3 checks passed
@jasonraimondi jasonraimondi deleted the fix/security-arbitrary-file-read-via-screenshot-url branch June 4, 2024 03:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Bug: Arbitrary File Read via Playwright's Screenshot Feature Exploiting File Wrapper
1 participant