We found results for “”
CVE-2023-50258
Date: December 22, 2023
Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The "testDiscord" request handler in "medusa/server/web/home/handler.py" does not validate the user-controlled "discord_webhook" variable and passes it to the "notifiers.discord_notifier.test_notify" method, then "_notify_discord" and finally "_send_discord_msg" method, which sends a POST request to the user-controlled URL on line 64 in "/medusa/notifiers/discord.py", which leads to a blind server-side request forgery. This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.
Language: Python
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


