{"id":"CVE-2021-33359","details":"A vulnerability exists in gowitness \u003c 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.","modified":"2026-03-13T04:58:25.380201Z","published":"2021-06-09T18:15:08.767Z","references":[{"type":"ADVISORY","url":"https://twitter.com/leonjza/status/1395283512433971202?s=19"},{"type":"FIX","url":"https://github.com/sensepost/gowitness/releases/tag/2.3.6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sensepost/gowitness","events":[{"introduced":"0"},{"fixed":"0685be62ecf91b778a097f9ca65cbbc7d6880556"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.3.6"}]}}],"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.0.6","1.0.7","1.0.8","1.1.0","1.2.0","1.2.1","1.3.0","1.3.1","1.3.2","1.3.3","1.3.4","2.0.0","2.1.0","2.1.1","2.1.2","2.2.0","2.2.1","2.3.0","2.3.1","2.3.2","2.3.3","2.3.4","2.3.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33359.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}