CVE-2022-0768

9.1 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the AllTube video downloader software. Attackers can exploit this vulnerability to make the server send unauthorized requests to internal systems, potentially accessing sensitive data or services. Users running AllTube versions prior to 3.0.2 are affected.

💻 Affected Systems

Products:
  • AllTube
Versions: All versions prior to 3.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of AllTube where the vulnerable code path is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration from internal systems, or use as a pivot point for further attacks on internal infrastructure.

🟠

Likely Case

Unauthorized access to internal HTTP services, metadata leakage from cloud services, or scanning of internal network resources.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only affecting the local server itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.2

Vendor Advisory: https://github.com/rudloff/alltube/commit/148a171b240e7ceb076b9e198bef412de14ac55d

Restart Required: Yes

Instructions:

1. Update AllTube to version 3.0.2 or later. 2. Pull the latest code from GitHub repository. 3. Restart the AllTube service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation to reject URLs pointing to internal IP addresses or localhost.

Network Egress Filtering

all

Configure firewall rules to restrict outbound connections from the AllTube server to only necessary external services.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the AllTube server from sensitive internal systems.
  • Deploy a web application firewall (WAF) with SSRF protection rules enabled.

🔍 How to Verify

Check if Vulnerable:

Check if AllTube version is below 3.0.2 by examining the software version or checking the commit hash in the codebase.

Check Version:

Check the version in the AllTube web interface or examine the package/installation files for version information.

Verify Fix Applied:

Verify that AllTube version is 3.0.2 or higher and that the commit 148a171b240e7ceb076b9e198bef412de14ac55d is present in the codebase.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the AllTube server to internal IP addresses
  • Requests to metadata services (169.254.169.254, etc.)
  • Multiple failed connection attempts to internal services

Network Indicators:

  • HTTP traffic from AllTube server to internal network segments
  • Requests to localhost/127.0.0.1 from the server
  • Unusual port scanning patterns originating from the server

SIEM Query:

source="alltube-server" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.1 OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export