CVE-2025-62511 (CNNVD-202510-2461)

MEDIUM
中文标题:
YtGrabber-TUI 安全漏洞
英文标题:
yt-grabber-tui local arbitrary file overwrite via TOCTOU race in config file creation
CVSS分数: 6.3
发布时间: 2025-10-17 19:55:34
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

YtGrabber-TUI是Женя Бородин个人开发者的一个软件的界面。 YtGrabber-TUI 1.0版本存在安全漏洞,该漏洞源于默认配置文件config.json创建过程中存在TOCTOU竞争条件,可能导致任意文件覆盖。

英文描述:

yt-grabber-tui is a C++ terminal user interface application for downloading YouTube content. yt-grabber-tui version 1.0 contains a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) in the creation of the default configuration file config.json. In version 1.0, load_json_settings in Settings.hpp checks for the existence of config.json using boost::filesystem::exists and, if the file is missing, calls create_json_settings which writes the JSON configuration with boost::property_tree::write_json. A local attacker with write access to the application’s configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link between the existence check and the subsequent write so that the write operation follows the symlink and overwrites an attacker-chosen file accessible to the running process. This enables arbitrary file overwrite within the privileges of the application process, which can corrupt files and cause loss of application or user data. If the application is executed with elevated privileges, this could extend to system file corruption. The issue is fixed in version 1.0.1.

CWE类型:
CWE-367
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
zheny-creator YtGrabber-TUI < 1.0.1 - - cpe:2.3:a:zheny-creator:ytgrabber-tui:<_1.0.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/zheny-creator/YtGrabber-TUI/security/advisories/GHSA-hwwf-fq6p-rw9q x_refsource_CONFIRM
cve.org
访问
https://github.com/zheny-creator/YtGrabber-TUI/commit/bf065e833820bb4253a70a4c1dc6b843c6d8bf21 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.3
CVSS向量: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
机密性
NONE
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-10-17 19:55:34
修改时间:
2025-10-17 20:22:40
创建时间:
2025-11-11 15:40:49
更新时间:
2025-11-11 16:00:18
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62511 2025-11-11 15:23:33 2025-11-11 07:40:49
NVD nvd_CVE-2025-62511 2025-11-11 15:01:06 2025-11-11 07:48:35
CNNVD cnnvd_CNNVD-202510-2461 2025-11-11 15:12:59 2025-11-11 08:00:18
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:18
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202510-2461; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202510-2461
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:35
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']