CVE-2026-24139

6.5 MEDIUM

📋 TL;DR

CVE-2026-24139 is an authorization bypass vulnerability in MyTube that allows guest or low-privileged users to download the complete application database. This exposes sensitive data including user information, download history, and potentially credentials. All users running MyTube versions 1.7.78 and below are affected.

💻 Affected Systems

Products:
  • MyTube
Versions: 1.7.78 and below
Operating Systems: All platforms running MyTube
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with database export functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database exfiltration including user credentials, personal information, and sensitive application data leading to full system compromise.

🟠

Likely Case

Unauthorized access to user data, download history, and potentially exposed credentials requiring password resets.

🟢

If Mitigated

Minimal impact with proper access controls and network segmentation limiting exposure.

🌐 Internet-Facing: HIGH - Directly accessible endpoints allow unauthenticated database downloads.
🏢 Internal Only: MEDIUM - Internal users could still exploit this for privilege escalation or data theft.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to database export endpoint without proper authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.79 or later

Vendor Advisory: https://github.com/franklioxygen/MyTube/security/advisories/GHSA-hhc3-8q8c-89q7

Restart Required: Yes

Instructions:

1. Update MyTube to version 1.7.79 or later. 2. Restart the MyTube service. 3. Verify the fix by testing database export endpoint access.

🔧 Temporary Workarounds

Disable database export endpoint

all

Temporarily disable or block access to the database export functionality

# Modify MyTube configuration to disable export endpoint
# Use web server rules to block /export or similar paths

Network access control

linux

Restrict access to MyTube administration interfaces

# Firewall rule example: iptables -A INPUT -p tcp --dport [MyTube_port] -s [trusted_ips] -j ACCEPT
# iptables -A INPUT -p tcp --dport [MyTube_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MyTube from untrusted networks
  • Deploy web application firewall (WAF) rules to block unauthorized database export requests

🔍 How to Verify

Check if Vulnerable:

Attempt to access database export endpoint as guest/unauthenticated user. If database download succeeds, system is vulnerable.

Check Version:

Check MyTube version in web interface or configuration files

Verify Fix Applied:

Test database export endpoint access - authenticated admin should succeed, guest/unauthenticated should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to database export endpoints
  • Large database download requests from non-admin users

Network Indicators:

  • HTTP requests to /export or similar endpoints from unauthorized IPs
  • Unusual large data transfers from MyTube server

SIEM Query:

source="mytube.log" AND (uri_path="/export" OR uri_path="/database") AND user="guest"

🔗 References

📤 Share & Export