spotube icon indicating copy to clipboard operation
spotube copied to clipboard

zero day exploit for spotube

Open s-b-repo opened this issue 8 months ago • 3 comments

Is there an existing issue for this? (Please read the description)

  • [x] I have searched the existing issues

Current Behavior

https://github.com/s-b-repo/deadtube.py/tree/main hi i made a exploit for spotube please fix the api fully working zero day exploit for spotube you can change and control someones app if they are on the same network as you the songs play state

Expected Behavior

authenticate before running next song or running these commands

Steps to reproduce

connect to ip on port with url path then it executes commands

Logs

nn

Operating System

tested this using kali linux

Spotube version

v4.0.2

Installation source

GitHub Releases (Binary)

Additional information

No response

Self grab

  • [ ] I'm ready to work on this issue!

s-b-repo avatar Apr 24 '25 11:04 s-b-repo

Ok vulnerability is the path traversal by including ../ in track name. Even if attacker can put files in the host's machine it can't be executed remotely. But still it can be dangerous if the user accidentally executes a malicious file thinking it's an simple .m4a or an audio file Thanks for submitting. I'll fix it asap

KRTirtho avatar Apr 27 '25 06:04 KRTirtho

Ok vulnerability is the path traversal by including ../ in track name. Even if attacker can put files in the host's machine it can't be executed remotely. But still it can be dangerous if the user accidentally executes a malicious file thinking it's an simple .m4a or an audio file Thanks for submitting. I'll fix it asap

no problem hope its a intrestting

s-b-repo avatar Apr 27 '25 21:04 s-b-repo

Should this be closed now since #2687 has been merged?

coder0107git avatar May 13 '25 05:05 coder0107git