Lucene search

K
githubGitHub Advisory DatabaseGHSA-R9X7-2XMR-V8FW
HistorySep 16, 2022 - 5:45 p.m.

mangadex-downloader vulnerable to unauthorized file reading

2022-09-1617:45:28
CWE-20
GitHub Advisory Database
github.com
15
web url location
unauthorized file reading
mangadex-downloader

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

26.2%

Impact

When using file:<location> command and <location> is web URL location (http, https). mangadex-downloader will try to open and read a file in local disk if the content from online file is exist-as-a-file in victim computer

So far, the app only read the files and not execute it. But still, when someone reading your files without you knowing, it’s very scary.

Proof of Concept (PoC)

https://www.mansuf.link/unauthorized-file-read-in-mangadex-downloader-cve-2022-36082/

Workarounds

Unfortunately, there is no workarounds to make it safe from this issue. But i suggest you double check the url before proceed to download or update to latest version ( >= 1.7.2)

Patches

Fixed in version 1.7.2.
Commit patch: https://github.com/mansuf/mangadex-downloader/commit/439cc2825198ebc12b3310c95c39a8c7710c9b42

Affected configurations

Vulners
Node
mangadex-downloader_projectmangadex-downloaderRange1.3.01.7.2
VendorProductVersionCPE
mangadex-downloader_projectmangadex-downloader*cpe:2.3:a:mangadex-downloader_project:mangadex-downloader:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

26.2%

Related for GHSA-R9X7-2XMR-V8FW