MyTube has Mass Assignment via Settings Management
Description
MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.
Affected products
1- Range: v1.3.15, v1.3.16, v1.3.17, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/franklioxygen/MyTube/commit/9d737cb373f7af3e5c92d458e2832caf817b6de6mitrex_refsource_MISC
- github.com/franklioxygen/MyTube/security/advisories/GHSA-c938-x24g-fxcxmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.