Server-side Request Forgery (SSRF) Affecting rudloff/alltube package, versions <3.0.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-RUDLOFFALLTUBE-2420041
  • published9 Mar 2022
  • disclosed9 Mar 2022
  • creditPierre Rudloff

Introduced: 9 Mar 2022

CVE-2022-24739  (opens in a new tab)
CWE-601  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade rudloff/alltube to version 3.0.3 or higher.

Overview

rudloff/alltube is a HTML GUI for youtube-dl.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) which allows an attacker to craft an HTML page. It can also trigger an open redirect attack depending on how AllTube is configured. The impact is mitigated by the fact that the SSRF attack is only possible when the stream option is enabled in the configuration. Note that this option is disabled by default.

Note: The fix requires applying a patch to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched. However, if you are using an unpatched version of youtube-dl you might still be vulnerable.

CVSS Scores

version 3.1