Information Exposure Affecting youtube-dlc package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-YOUTUBEDLC-5759277
  • published7 Jul 2023
  • disclosed7 Jul 2023
  • creditGrub4K, bashonly, coletdjnz

Introduced: 7 Jul 2023

CVE-2023-35934  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for youtube-dlc.

Overview

youtube-dlc is a Media downloader supporting various sites such as youtube

Affected versions of this package are vulnerable to Information Exposure. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host.

Workaround

Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using --load-info-json. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use curl as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM.

CVSS Scores

version 3.1