Логотип exploitDog
bind:CVE-2023-40581
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40581

Количество 5

Количество 5

ubuntu логотип

CVE-2023-40581

больше 2 лет назад

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021...

CVSS3: 8.3
EPSS: Низкий
nvd логотип

CVE-2023-40581

больше 2 лет назад

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04

CVSS3: 8.3
EPSS: Низкий
debian логотип

CVE-2023-40581

больше 2 лет назад

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp ...

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-42h4-v29r-42qg

больше 2 лет назад

yt-dlp on Windows vulnerable to `--exec` command injection when using `%q`

CVSS3: 8.3
EPSS: Низкий
fstec логотип

BDU:2023-06330

больше 2 лет назад

Уязвимость утилиты загрузки аудио и видео yt-dlp, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40581

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021...

CVSS3: 8.3
10%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-40581

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04

CVSS3: 8.3
10%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-40581

yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp ...

CVSS3: 8.3
10%
Низкий
больше 2 лет назад
github логотип
GHSA-42h4-v29r-42qg

yt-dlp on Windows vulnerable to `--exec` command injection when using `%q`

CVSS3: 8.3
10%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06330

Уязвимость утилиты загрузки аудио и видео yt-dlp, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.3
10%
Низкий
больше 2 лет назад

Уязвимостей на страницу