mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
88 lines
5.4 KiB
JSON
88 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2024-38519",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-07-02T14:15:13.737",
|
|
"lastModified": "2024-07-04T00:15:01.980",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "`yt-dlp` and `youtube-dl` are command-line audio/video downloaders. Prior to the fixed versions,\u00a0`yt-dlp` and `youtube-dl` do not limit the extensions of downloaded files, which could lead to arbitrary filenames being created in the download folder (and path traversal on Windows). Since `yt-dlp` and `youtube-dl` also read config from the working directory (and on Windows executables will be executed from the `yt-dlp` or `youtube-dl` directory), this could lead to arbitrary code being executed.\n\n\n\n\n`yt-dlp` version 2024.07.01 fixes this issue by whitelisting the allowed extensions. `youtube-dl` fixes this issue in commit `d42a222` on the `master` branch and in nightly builds tagged 2024-07-03 or later. This might mean some very uncommon extensions might not get downloaded, however it will also limit the possible exploitation surface. In addition to upgrading, have `.%(ext)s` at the end of the output template and make sure the user trusts the websites that they are downloading from. Also, make sure to never download to a directory within PATH or other sensitive locations like one's user directory, `system32`, or other binaries locations. For users who are not able to upgrade, keep the default output template (`-o \"%(title)s [%(id)s].%(ext)s`); make sure the extension of the media to download is a common video/audio/sub/... one; try to avoid the generic extractor; and/or use `--ignore-config --config-location ...` to not load config from common locations."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "`yt-dlp` es un descargador de audio/v\u00eddeo de l\u00ednea de comandos. Antes de la versi\u00f3n 2024.07.01, `yt-dlp` no limita las extensiones de los archivos descargados, lo que podr\u00eda provocar la creaci\u00f3n de nombres de archivos arbitrarios en la carpeta de descarga (y el path traversal en Windows). Dado que `yt-dlp` tambi\u00e9n lee la configuraci\u00f3n del directorio de trabajo (y en Windows los ejecutables se ejecutar\u00e1n desde el directorio yt-dlp), esto podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. La versi\u00f3n 2024.07.01 de `yt-dlp` soluciona este problema al incluir en la lista blanca las extensiones permitidas. Esto podr\u00eda significar que algunas extensiones muy poco comunes podr\u00edan no descargarse, sin embargo, tambi\u00e9n limitar\u00e1 la posible superficie de explotaci\u00f3n. Adem\u00e1s de actualizar, coloque `.%(ext)s` al final de la plantilla de salida y aseg\u00farese de que el usuario conf\u00ede en los sitios web desde los que realiza la descarga. Adem\u00e1s, aseg\u00farese de nunca descargar a un directorio dentro de PATH u otras ubicaciones confidenciales como el directorio de usuario, `system32` u otras ubicaciones de archivos binarios. Para los usuarios que no pueden actualizar, mantenga la plantilla de salida predeterminada (`-o \"%(title)s [%(id)s].%(ext)s`); aseg\u00farese de que la extensi\u00f3n del medio a descargar sea uno com\u00fan de video/audio/sub/... trate de evitar el extractor gen\u00e9rico y/o use `--ignore-config --config-location...` para no cargar la configuraci\u00f3n desde ubicaciones comunes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-669"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/dirkf/youtube-dl/security/advisories/GHSA-22fp-mf44-f2mq",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/yt-dlp/yt-dlp/commit/5ce582448ececb8d9c30c8c31f58330090ced03a",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/yt-dlp/yt-dlp/releases/tag/2024.07.01",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-79w7-vh3h-8g4j",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/ytdl-org/youtube-dl/commit/d42a222ed541b96649396ef00e19552aef0f09ec",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/ytdl-org/youtube-dl/pull/32830",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://securitylab.github.com/advisories/GHSL-2024-089_youtube-dl/",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://securitylab.github.com/advisories/GHSL-2024-090_yt-dlp",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |