Skip to content

Unauthorized file read in `file:<location>` command where `<location>` is web URL location

Moderate
mansuf published GHSA-r9x7-2xmr-v8fw Sep 5, 2022

Package

pip mangadex-downloader (pip)

Affected versions

>= 1.3.0, < 1.7.2

Patched versions

>= 1.7.2

Description

Impact

When using file:<location> command and <location> is web URL location (http, https). mangadex-downloader will try to open and read a file in local disk if the content from online file is exist-as-a-file in victim computer

So far, the app only read the files and not execute it. But still, when someone reading your files without you knowing, it's very scary.

Proof of Concept (PoC)

https://www.mansuf.link/unauthorized-file-read-in-mangadex-downloader-cve-2022-36082/

Workarounds

Unfortunately, there is no workarounds to make it safe from this issue. But i suggest you double check the url before proceed to download or update to latest version ( >= 1.7.2)

Patches

Fixed in version 1.7.2.
Commit patch: 439cc28

Severity

Moderate

CVE ID

CVE-2022-36082

Weaknesses

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. Learn more on MITRE.

Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Learn more on MITRE.