<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gotenberg (&lt;= 8.29.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gotenberg--8.29.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 00:55:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gotenberg--8.29.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gotenberg ExifTool Metadata Write Blocklist Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</link><pubDate>Thu, 07 May 2026 00:55:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</guid><description>The ExifTool metadata write blocklist in Gotenberg v8 can be bypassed using ExifTool's group-prefix syntax, enabling arbitrary file rename, move, hardlink, and symlink creation on the server.</description><content:encoded><![CDATA[<p>Gotenberg, a Docker-powered document conversion API, is vulnerable to a bypass in its ExifTool metadata write blocklist. This vulnerability, affecting Gotenberg v8 (&lt;= 8.29.1), allows unauthenticated attackers to manipulate file system operations within the Gotenberg container. The vulnerability leverages ExifTool&rsquo;s group-prefix syntax to circumvent the intended restrictions on pseudo-tags like <code>FileName</code>, <code>Directory</code>, <code>HardLink</code>, and <code>SymLink</code>. This bypass is particularly critical as it directly negates the fix implemented for GHSA-qmwh-9m9c-h36m. The pre-auth nature of this vulnerability significantly broadens the attack surface, allowing malicious actors to potentially gain unauthorized access and control over file system resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the <code>/forms/pdfengines/metadata/write</code> endpoint.</li>
<li>The request includes a <code>metadata</code> field containing a JSON object with malicious ExifTool tags.</li>
<li>The attacker uses the group-prefix syntax (e.g., <code>File:FileName</code>) to bypass the tag blocklist in <code>pkg/modules/exiftool/exiftool.go</code>.</li>
<li>The <code>safeKeyPattern</code> regex (<code>^[a-zA-Z0-9\-_.:]+$</code>) allows colons, so prefixed tag names pass validation.</li>
<li>The <code>SetNewValue</code> function in ExifTool&rsquo;s <code>Writer.pl</code> strips the prefix, allowing the malicious tag to be processed.</li>
<li>ExifTool executes the file system operation specified by the malicious tag (e.g., renaming, moving, creating symlinks).</li>
<li>If the Gotenberg deployment uses mounted volumes or is non-containerized, the attacker can perform actions outside the container.</li>
<li>The attacker achieves arbitrary file read via symlink chaining and file overwrite via directory manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows pre-authenticated attackers to rename, move, or create links to files within the Gotenberg container. In deployments with mounted volumes or non-containerized setups, this can lead to arbitrary file read and overwrite via symlink chaining and directory manipulation. The vulnerability impacts Gotenberg v8 (&lt;= 8.29.1) and can potentially compromise the confidentiality and integrity of data processed by the service. This is a direct bypass of a previous security fix, increasing the risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Gotenberg to a version greater than 8.29.1 to remediate CVE-2026-42590.</li>
<li>Implement input validation and sanitization on the <code>metadata</code> field of the <code>/forms/pdfengines/metadata/write</code> endpoint to prevent exploitation of the ExifTool group-prefix bypass.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg ExifTool Metadata Write - File Rename</code> to detect attempts to rename files using the vulnerable endpoint.</li>
<li>Monitor web server logs for requests to <code>/forms/pdfengines/metadata/write</code> with <code>metadata</code> containing &ldquo;File:FileName&rdquo;, &ldquo;File:Directory&rdquo;, &ldquo;File:HardLink&rdquo;, or &ldquo;File:SymLink&rdquo; to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>gotenberg</category><category>exiftool</category><category>metadata</category><category>file-manipulation</category></item></channel></rss>