FreeBSD : mpv -- arbitrary code execution via crafted website (3ee6e521-0d32-11e8-99b0-d017c2987f9a)

Medium Nessus Plugin ID 106734


The remote FreeBSD host is missing a security-related update.


mpv developers report :

mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted website, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname.
The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 106734

File Name: freebsd_pkg_3ee6e5210d3211e899b0d017c2987f9a.nasl

Version: 3.4

Type: local

Published: 2018/02/12

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mpv, cpe:/o:freebsd:freebsd

Patch Publication Date: 2018/02/09

Vulnerability Publication Date: 2018/01/28

Reference Information

CVE: CVE-2018-6360