CVE-2023-46121 Affecting yt-dlp package, versions <2023.11.14-r0


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (33rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE321-YTDLP-8490015
  • published6 Dec 2024
  • disclosed15 Nov 2023

Introduced: 15 Nov 2023

CVE-2023-46121  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 yt-dlp to version 2023.11.14-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream yt-dlp package and not the yt-dlp package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

yt-dlp is a youtube-dl fork with additional features and fixes. The Generic Extractor in yt-dlp is vulnerable to an attacker setting an arbitrary proxy for a request to an arbitrary url, allowing the attacker to MITM the request made from yt-dlp's HTTP session. This could lead to cookie exfiltration in some cases. Version 2023.11.14 removed the ability to smuggle http_headers to the Generic extractor, as well as other extractors that use the same pattern. Users are advised to upgrade. Users unable to upgrade should disable the Ggneric extractor (or only pass trusted sites with trusted content) and ake caution when using --no-check-certificate.

CVSS Scores

version 3.1