CVE-2023-50264
- Reference to the description:
- Description:
- Bazarr manages and downloads subtitles. Prior to 1.3.1, Bazarr contains an arbitrary file read in /system/backup/download/ endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1.
- Last updated date:
- 12/19/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/19/2023
- Reference url to background
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/