In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
youtube_dl is a YouTube video downloader
Affected versions of this package are vulnerable to Incorrect Resource Transfer Between Spheres via improper file extension sanitization, which could create arbitrary filenames in the download folder (and path traversal on Windows). An attacker can modify the file system and execute arbitrary code by crafting malicious filenames that bypass security checks.
This vulnerability can be mitigated by ensuring the output template ends with .%(ext)s
Downloading only from trusted websites.
Avoiding downloads to directories within the executable search PATH
or other sensitive locations.
Setting NoDefaultCurrentDirectoryInExePath
on Windows.
Ensuring downloaded media has a common extension (use --get-filename
).
Omitting subtitle download options (--write-subs
/ --write-srt
, --write-auto-subs
/--write-automatic-subs
, --all-subs
).