cve/2024/CVE-2024-49763.md
2025-09-29 21:09:30 +02:00

19 lines
1021 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-49763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49763)
![](https://img.shields.io/static/v1?label=Product&message=PlexRipper&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%200.24.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains&color=brightgreen)
### Description
PlexRipper is a cross-platform media downloader for Plex. PlexRippers open CORS policy allows attackers to gain sensitive information from PlexRipper by getting the user to access the attackers domain. This allows an attacking website to access the /api/PlexAccount endpoint and steal the users Plex login. This vulnerability is fixed in 0.24.0.
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2024-305_PlexRipper/
#### Github
No PoCs found on GitHub currently.