# MyTube 授权绕过漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Authorization Bypass vulnerability · Advisory · franklioxygen/MyTube · GitHub -- 🔗来源链接
标签:x_refsource_CONFIRM
神龙速读:
从该网页截图中可以获取到以下关于漏洞的关键信息:
### Title
- **Authorization Bypass vulnerability**
### Package
- **MyTube (npm)**
### Affected and Patched Versions
- **Affected versions:** <=1.7.65
- **Patched versions:** 1.7.66
### Vulnerability Type
- **Improper Authorization / Authentication Bypass**
### Impact
- **Critical:** This flaw enables unauthenticated users to bypass authentication checks in the `roleBasedAuthMiddleware` by simply not providing an authentication cookie, allowing them to:
- Access and modify application settings via `/api/settings`.
- Change administrative and visitor passwords.
- Access other protected routes that rely on this middleware.
### Fixes
- The vulnerability is fixed in version **1.7.66 (or higher)**. All users are advised to upgrade to at least **version 1.7.64** immediately, as this specific version explicitly blocks requests from unauthenticated users.
### Workarounds
1. **Restricting Network Access:** Use a firewall or reverse proxy (like Nginx) to restrict access to the `/api/` endpoints to trusted IP addresses only.
2. **Manual Patch:** Edit the source code in `roleBasedAuthMiddleware` to ensure it returns a 401 Unauthorized error when `req.user` is undefined.
### Severity
- **Severity Score:** Critical (9.8/10)
### CVSS Metrics
- **Attack Vector:** Network
- **Attack Complexity:** Low
- **Privileges Required:** None
- **User Interaction:** None
- **Scope:** Unchanged
- **Confidentiality, Integrity, Availability:** High
### Referenced Documents
- [Github Security Advisory - MyTube]
- Special thanks to **p1ngul1n0** for reporting and helping resolve this issue.
### CVE ID
- **CVE-2026-23837**
### Weakness (CWE)
- **CWE-863** (Incorrect Authorization)
标题: Security fix: Add authentication checks for unauthenticated users in … · franklioxygen/MyTube@f85ae9b · GitHub -- 🔗来源链接
标签:x_refsource_MISC
神龙速读:
- ** Commit Summary**:
- Security fix: Add authentication checks for unauthenticated users in role-based middleware.
- ** Key Changes**:
- Added authentication checks for unauthenticated users in role-based middleware.
- Introduced `isLoginRequired` function from `services/passwordService`.
- Added logic for checking public endpoint paths such as `/verify-password`, `/verify-admin-password`, `/verify-visitor-password`, `/password-enabled`, `/reset-password-cooldown`.
- Adjusted middleware behavior based on login requirements and public endpoint checks.
- ** Concern**:
- If `loginEnabled` is true, unauthenticated users will be blocked except for public endpoints.
- Special attention required for public paths and password-related endpoints due to potential security implications.
暂无评论