<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloud-Metadata — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cloud-metadata/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 13:51:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cloud-metadata/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gotenberg SSRF via Chromium URL Endpoint with Redirect Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</link><pubDate>Mon, 11 May 2026 13:51:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</guid><description>Gotenberg's Chromium URL-to-PDF conversion endpoint is vulnerable to SSRF due to a lack of default protection against HTTP/HTTPS-based requests, allowing attackers to target internal IPs and cloud metadata endpoints, which can be bypassed via HTTP redirects.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability exists in Gotenberg, an open-source PDF conversion tool. Specifically, the Chromium URL-to-PDF conversion endpoint (<code>/forms/chromium/convert/url</code>) lacks default protection against HTTP/HTTPS-based SSRF, while the default deny-list only blocks <code>file://</code> URIs. This allows unauthenticated attackers to target internal IPs, RFC 1918 ranges, and cloud metadata endpoints, receiving the response rendered as a PDF. Furthermore, even when operators configure a custom deny-list, the protection is bypassed via HTTP redirects. The Gotenberg instance follows <code>302</code> redirects from attacker-controlled external URLs to internal targets without re-validating the redirect destination against the deny-list. Version 8.30.1 of Gotenberg is confirmed to be vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Gotenberg instance accessible over the network, which requires no authentication by default.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/forms/chromium/convert/url</code> endpoint.</li>
<li>The POST request includes a <code>url</code> parameter pointing to an internal resource (e.g., <code>http://127.0.0.1:3000/health</code> or <code>http://169.254.169.254/latest/meta-data/</code>).</li>
<li>Alternatively, the POST request includes a <code>url</code> parameter pointing to an external redirect server (e.g., <code>http://172.17.0.1:9999/</code>).</li>
<li>If using a redirect, the external server responds with a <code>302</code> redirect to an internal target (e.g., <code>http://127.0.0.1:3000/health</code>).</li>
<li>The Gotenberg server, using a headless Chromium instance, fetches the URL (or follows the redirect) without proper validation.</li>
<li>The response from the internal resource is rendered as a PDF document.</li>
<li>The PDF document containing the sensitive information is returned to the attacker. The attacker exfiltrates the data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to make the Gotenberg server fetch arbitrary internal resources and receive the rendered content as a PDF. This can lead to cloud credential theft by accessing cloud metadata endpoints, internal service access by reaching admin panels or databases, and internal port scanning. The redirect bypass further exacerbates the risk, rendering custom deny-lists ineffective. This vulnerability affects Gotenberg deployments that have broad internal network access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Gotenberg SSRF via Chromium URL Endpoint</code> to identify attempts to exploit this vulnerability by monitoring for HTTP POST requests to the <code>/forms/chromium/convert/url</code> endpoint with potentially malicious URLs.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg SSRF Redirect Bypass</code> to detect connections to external redirect servers that may be used to bypass SSRF protections.</li>
<li>Upgrade Gotenberg to version 8.32.0 or later to patch CVE-2026-42595.</li>
<li>Implement network segmentation to limit the Gotenberg instance&rsquo;s access to internal resources, mitigating the impact of a successful SSRF attack.</li>
<li>Configure a custom deny-list on the Chromium URL endpoint to explicitly block access to internal IPs, RFC 1918 ranges, and cloud metadata endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>gotenberg</category><category>cve-2026-42595</category><category>cloud-metadata</category></item></channel></rss>