logo

CVE-2022-24739 rudloff/alltube

Package

Manager: composer
Name: rudloff/alltube
Vulnerable Version: >=0 <3.0.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00247 pctl0.47845

Details

Server-Side Request Forgery and Open Redirect in AllTube Download ### Impact On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) ### Patches 3.0.3 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**. ### References * https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a * https://github.com/ytdl-org/youtube-dl/issues/30691

Metadata

Created: 2022-03-09T15:17:31Z
Modified: 2022-03-09T20:13:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-75p7-527p-w8wp/GHSA-75p7-527p-w8wp.json
CWE IDs: ["CWE-601", "CWE-918"]
Alternative ID: GHSA-75p7-527p-w8wp
Finding: F100
Auto approve: 1