5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
7.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.4%
yt-dlp is vulnerable to HTTP Request Smuggling. The vulnerability is due to _real_extract
function in generic.py
file there is no validation and sanitization of http_headers
included through the URL. This allows an attacker to setting an arbitrary proxy for a request to an arbitrary url, can potentially leads to MITM the request made from yt-dlp’s HTTP session
5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
7.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.4%