Description
alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp
Patch, Third Party Advisory x_refsource_misc
https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d
Patch, Third Party Advisory x_refsource_misc
https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a
Patch, Third Party Advisory x_refsource_misc
https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a
Scores
CVSS v3
7.3
EPSS
0.0025
EPSS Percentile
47.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
CWE-601
Status
published
Products (2)
alltube_project/alltube
< 3.0.3
rudloff/alltube
0 - 3.0.3Packagist
Published
Mar 08, 2022
Tracked Since
Feb 18, 2026