Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r9x7-2xmr-v8fw

Опубликовано: 16 сент. 2022
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

mangadex-downloader vulnerable to unauthorized file reading

Impact

When using file:<location> command and <location> is web URL location (http, https). mangadex-downloader will try to open and read a file in local disk if the content from online file is exist-as-a-file in victim computer

So far, the app only read the files and not execute it. But still, when someone reading your files without you knowing, it's very scary.

Proof of Concept (PoC)

https://www.mansuf.link/unauthorized-file-read-in-mangadex-downloader-cve-2022-36082/

Workarounds

Unfortunately, there is no workarounds to make it safe from this issue. But i suggest you double check the url before proceed to download or update to latest version ( >= 1.7.2)

Patches

Fixed in version 1.7.2. Commit patch: https://github.com/mansuf/mangadex-downloader/commit/439cc2825198ebc12b3310c95c39a8c7710c9b42

Пакеты

Наименование

mangadex-downloader

pip
Затронутые версииВерсия исправления

>= 1.3.0, < 1.7.2

1.7.2

EPSS

Процентиль: 44%
0.0022
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 5.3
nvd
больше 3 лет назад

mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:<location>` command and `<location>` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.

EPSS

Процентиль: 44%
0.0022
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-20