ajinabraham.njsscan.ssrf_wkhtmltoimage.wkhtmltoimage_ssrf

Author
1,129
Download Count*
License
User controlled URL reached to wkhtmltoimage
can result in Server Side Request Forgery (SSRF).
Run Locally
Run in CI
Defintion
rules:
- id: wkhtmltoimage_ssrf
patterns:
- pattern-inside: |
require('wkhtmltoimage')
...
- pattern-either:
- pattern-inside: function ($REQ, $RES, ...) {...}
- pattern-inside: function $FUNC($REQ, $RES, ...) {...}
- pattern-inside: $X = function $FUNC($REQ, $RES, ...) {...}
- pattern-inside: var $X = function $FUNC($REQ, $RES, ...) {...};
- pattern-inside: $APP.$METHOD(..., function $FUNC($REQ, $RES, ...) {...})
- pattern-either:
- pattern: |
$INP = <... $REQ.$VAR ...>;
...
$PKG.generate(<... $INP ...>, ...)
- pattern: |
$INP = <... $REQ.$VAR.$FOO ...>;
...
$PKG.generate(<... $INP ...>, ...)
- pattern: |
$PKG.generate(<... $REQ.$VAR ...>, ...)
- pattern: |
$PKG.generate(<... $REQ.$VAR.$FOO ...>, ...)
message: User controlled URL reached to `wkhtmltoimage` can result in Server
Side Request Forgery (SSRF).
languages:
- javascript
severity: ERROR
metadata:
owasp-web: a1
cwe: cwe-918
license: LGPL-3.0-or-later
Short Link: https://sg.run/Av3w