Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-35934

Опубликовано: 06 июл. 2023
Источник: nvd
CVSS3: 6.1
CVSS3: 8.2
EPSS Низкий

Описание

yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for curl and httpie (version 3.1.0 or later).

At the file download stage, all cookies are passed by yt-dlp to the file downloader as a Cookie header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped.

yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the Cookie header upon HTTP redirects; havi

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:youtube-dlc_project:youtube-dlc:*:*:*:*:*:*:*:*
cpe:2.3:a:yt-dl:youtube-dl:*:*:*:*:*:*:*:*
Версия от 2015.01.25 (включая)
cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:-:*:*:*
Версия до 2023.07.06 (исключая)
cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:nightly:*:*:*
Версия до 2023.07.06.185519 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

EPSS

Процентиль: 70%
0.00646
Низкий

6.1 Medium

CVSS3

8.2 High

CVSS3

Дефекты

CWE-200
CWE-601

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 2 лет назад

yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later). At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped. yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; hav...

CVSS3: 6.1
debian
больше 2 лет назад

yt-dlp is a command-line program to download videos from video sites. ...

CVSS3: 6.1
github
больше 2 лет назад

yt-dlp File Downloader cookie leak

suse-cvrf
около 2 лет назад

Security update for yt-dlp

EPSS

Процентиль: 70%
0.00646
Низкий

6.1 Medium

CVSS3

8.2 High

CVSS3

Дефекты

CWE-200
CWE-601