PyPi: Yt-Dlp

CVE-2024-38519

Safety vulnerability ID: 72085

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 02, 2024 Updated at Dec 07, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of yt-dlp and youtube-dl, command-line audio/video downloaders, are vulnerable to arbitrary file creation due to not limiting downloaded file extensions. This vulnerability could lead to path traversal on Windows, where arbitrary filenames can be created in the download folder. Additionally, yt-dlp and youtube-dl read config files from the working directory, which, on Windows, could result in the execution of arbitrary code if executables are run from the yt-dlp or youtube-dl directory. Users should whitelist allowed extensions and avoid downloading to sensitive locations. As a mitigation, use the default output template and ensure the downloaded media's extension is common. Avoid using the generic extractor and use --ignore-config --config-location to specify a safe config location.
# This only affects Windows users

Affected package

yt-dlp

Latest version: 2024.12.6

A feature-rich command-line audio/video downloader

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application