alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a | Patch Third Party Advisory |
Configurations
Information
Published : 2022-03-08 14:15
Updated : 2022-03-14 06:42
NVD link : CVE-2022-24739
Mitre link : CVE-2022-24739
JSON object : View
CWE
Products Affected
alltube_project
- alltube