CVE-2023-50266
MEDIUM
5,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
Description
AI Translation Available
Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0011
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
918
Server-Side Request Forgery (SSRF)
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Potential Impacts:
Read Application Data
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Applicable Platforms
Technologies:
AI/ML, Web Based, Web Server
Application
Bazarr by Bazarr
CPE Identifier
View Detailed Analysis
cpe:2.3:a:bazarr:bazarr:1.2.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d4…
https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d4…
https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/