logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-50264

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-50264

Description:
Bazarr manages and downloads subtitles. Prior to 1.3.1, Bazarr contains an arbitrary file read in /system/backup/download/ endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1.
Last updated date:
12/19/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/19/2023
Reference url to background

https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy