CVE-2026-24140

2.7 LOW

📋 TL;DR

MyTube versions 1.7.78 and below have a mass assignment vulnerability in settings management that allows attackers to modify arbitrary application settings. This affects self-hosted MyTube instances where attackers can send unauthorized property names that get persisted to the database. The vulnerability requires access to the settings management functionality.

💻 Affected Systems

Products:
  • MyTube
Versions: 1.7.78 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the issue is in the core saveSettings() function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative control by modifying authentication or authorization settings, potentially leading to complete system compromise.

🟠

Likely Case

Attacker modifies application settings to disrupt functionality, change download behavior, or alter player configurations.

🟢

If Mitigated

Limited impact with proper input validation and access controls restricting settings modification to authorized users only.

🌐 Internet-Facing: MEDIUM - Internet-facing instances are vulnerable if settings management endpoints are exposed, but exploitation requires specific access.
🏢 Internal Only: LOW - Internal instances have reduced attack surface but could be vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to settings management functionality but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.78

Vendor Advisory: https://github.com/franklioxygen/MyTube/security/advisories/GHSA-c938-x24g-fxcx

Restart Required: Yes

Instructions:

1. Backup your current MyTube installation and database. 2. Download version 1.7.78 or later from the official repository. 3. Replace the existing installation with the updated version. 4. Restart the MyTube service. 5. Verify the fix by checking the version.

🔧 Temporary Workarounds

Input Validation Middleware

all

Add middleware to validate allowed settings properties before they reach saveSettings() function.

# Requires modifying application code to implement property whitelisting

Access Restriction

linux

Restrict access to settings management endpoints to trusted IP addresses or authenticated admin users only.

# Configure web server (nginx/apache) to restrict /settings endpoints
# Example nginx: location ~ ^/settings { allow 192.168.1.0/24; deny all; }

🧯 If You Can't Patch

  • Implement network segmentation to isolate MyTube instances from sensitive systems
  • Enable detailed logging of all settings modification attempts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if your MyTube version is 1.7.78 or below by examining the application version in the web interface or configuration files.

Check Version:

Check web interface settings page or examine package.json/version file in installation directory

Verify Fix Applied:

After updating, verify the version shows 1.7.78 or higher and test that unauthorized property names are rejected when attempting to modify settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual settings modification requests
  • POST requests to settings endpoints with unexpected parameter names
  • Database writes to settings table with non-standard keys

Network Indicators:

  • HTTP requests to /api/settings or similar endpoints with unusual parameters
  • Burst of settings modification attempts

SIEM Query:

source="mytube.log" AND (uri_path="/api/settings" OR uri_path="/settings") AND (http_method="POST" OR http_method="PUT") | stats count by src_ip, form_data

🔗 References

📤 Share & Export