javascript.wkhtmltoimage.security.audit.wkhtmltoimage-injection.wkhtmltoimage-injection

profile photo of semgrepsemgrep
Author
3,078
Download Count*

If unverified user data can reach the wkhtmltoimage it can result in Server-Side Request Forgery vulnerabilities

Run Locally

Run in CI

Defintion

rules:
  - id: wkhtmltoimage-injection
    message: If unverified user data can reach the `wkhtmltoimage` it can result in
      Server-Side Request Forgery vulnerabilities
    metadata:
      owasp:
        - A10:2021 - Server-Side Request Forgery (SSRF)
      cwe:
        - "CWE-918: Server-Side Request Forgery (SSRF)"
      category: security
      technology:
        - wkhtmltoimage
      cwe2022-top25: true
      cwe2021-top25: true
      subcategory:
        - audit
      likelihood: LOW
      impact: LOW
      confidence: LOW
      references:
        - https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29
      license: Commons Clause License Condition v1.0[LGPL-2.1-only]
      vulnerability_class:
        - Server-Side Request Forgery (SSRF)
    languages:
      - javascript
      - typescript
    severity: WARNING
    patterns:
      - pattern-inside: |
          $WK = require('wkhtmltoimage');
          ...
      - pattern-not-inside: |
          var $INPUT = "...";
          ...
      - pattern: $WK.generate($INPUT,...)
      - pattern-not: $WK.generate("...",...)

Examples

wkhtmltoimage-injection.js

var wkhtmltoimage = require('wkhtmltoimage')

const html = '<html></html>'
// ok: wkhtmltoimage-injection
wkhtmltoimage.generate(html, { output: 'vuln.jpg' })

// ruleid: wkhtmltoimage-injection
wkhtmltoimage.generate(input(), { output: 'vuln.jpg' })

function test(userInput) {
    // ruleid: wkhtmltoimage-injection
    wkhtmltoimage.generate(userInput, { output: 'vuln.jpg' })
}