mirror of
				https://github.com/yt-dlp/yt-dlp.git
				synced 2025-10-31 14:45:14 +00:00 
			
		
		
		
	[core] Prevent RCE when using --exec with %q (CVE-2024-22423)
				
					
				
			The shell escape function now properly escapes `%`, `\\` and `\n`. `utils.Popen` as well as `%q` output template expansion have been patched accordingly. Prior to this fix using `--exec` together with `%q` when on Windows could cause remote code to execute. See https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-hjq6-52gw-2g7p for more details. Authored by: Grub4K
This commit is contained in:
		| @@ -142,5 +142,10 @@ | ||||
|         "when": "e3a3ed8a981d9395c4859b6ef56cd02bc3148db2", | ||||
|         "short": "[cleanup:ie] No `from` stdlib imports in extractors", | ||||
|         "authors": ["pukkandan"] | ||||
|     }, | ||||
|     { | ||||
|         "action": "add", | ||||
|         "when": "9590cc6b4768e190183d7d071a6c78170889116a", | ||||
|         "short": "[priority] Security: [[CVE-2024-22423](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22423)] [Prevent RCE when using `--exec` with `%q` on Windows](https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-hjq6-52gw-2g7p)\n    - The shell escape function now properly escapes `%`, `\\` and `\\n`.\n    - `utils.Popen` has been patched accordingly." | ||||
|     } | ||||
| ] | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Simon Sawicki
					Simon Sawicki