alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a | Patch Third Party Advisory |
https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-03-08T21:40:10
Updated: 2022-03-08T21:40:10
Reserved: 2022-02-10T00:00:00
Link: CVE-2022-24739
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-08T22:15:07.757
Modified: 2022-03-14T13:42:20.497
Link: CVE-2022-24739
JSON object: View
Redhat Information
No data.