Lucene search

K
cve[email protected]CVE-2023-50266
HistoryDec 15, 2023 - 9:15 p.m.

CVE-2023-50266

2023-12-1521:15:09
CWE-918
web.nvd.nist.gov
6
bazarr
cve-2023-50266
ssrf
server-side request forgery
vulnerability
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.8%

Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols.

Affected configurations

NVD
Node
bazarrbazarrMatch1.2.4
CPENameOperatorVersion
bazarr:bazarrbazarreq1.2.4

CNA Affected

[
  {
    "vendor": "morpheus65535",
    "product": "bazarr",
    "versions": [
      {
        "version": "1.2.4",
        "status": "affected"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.8%

Related for CVE-2023-50266