GHSA-r5hc-wm3g-hjw6

Suggest an improvement
Source
https://github.com/advisories/GHSA-r5hc-wm3g-hjw6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-r5hc-wm3g-hjw6/GHSA-r5hc-wm3g-hjw6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r5hc-wm3g-hjw6
Aliases
Published
2022-03-01T22:01:30Z
Modified
2024-02-21T05:32:09.684993Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Server-Side Request Forgery (SSRF) in rudloff/alltube
Details

Impact

Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname.

Patches

3.0.2 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.)

Part of the fix requires applying a patch to youtube-dl to prevent it from following HTTP redirects. If you are using the version of youtube-dl bundled with 3.0.2, it is already patched. However, if you are using your own unpatched version of youtube-dl you might still be vulnerable.

References

  • https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d
  • https://github.com/Rudloff/alltube/commit/1b099bb9836a3ce7c427a41722a7ab5a3d1c1b2d
  • https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903/
  • https://nvd.nist.gov/vuln/detail/CVE-2022-0768
  • https://github.com/ytdl-org/youtube-dl/issues/30691
References

Affected packages

Packagist / rudloff/alltube

Package

Name
rudloff/alltube
Purl
pkg:composer/rudloff/alltube

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2

Affected versions

0.*

0.3.0
0.3.1
0.3.2
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.5.0
0.5.1
0.5.2
0.6.0
0.7.0
0.7.1
0.7.2-beta
0.7.2-beta2
0.8.0
0.8.1-beta
0.9.0
0.10.0
0.10.1
0.10.2
0.11.0

1.*

1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.1.0
2.2.0
2.2.1
2.3.0

3.*

3.0.0-beta
3.0.0-beta2
3.0.0-beta3
3.0.0-beta4
3.0.0-beta5
3.0.0
3.0.1