Opened 6 years ago
Closed 6 years ago
#5991 closed defect (invalid)
Design issue affecting security
|Reported by:||Paul Ch||Owned by:|
|Blocking:||Reproduced by developer:||no|
|Analyzed by developer:||no|
Attacker can create file with special name and bypass protocol white/black lists and achieve SSRF, if filename is passed to ffmpeg as an argument like
ffmpeg -i <controlled_filename> output
How to reproduce:
$ nc -lvvp 1337 # listen of the local server to confirm the bug $ touch "http:localhost:1337.mov" # create file that will be pass as an argument $ ffmpeg -i "http:localhost:1337.mov" output.mov # trigger the bug
Execution of these shell commands confirms that if attacker controls the filename, he could control the protocol and workflow of FFmpeg.
FFmpeg is software commonly used by large companies and other projects which use it as third-party software to process video on their own servers. This report shows that if name of file has not been changed before it is passed to FFmpeg, it could cause very harmful consequences. It was confirmed that issue exists in modern services and it is highly recommended to fix it.
Contact me if you need more details about this issue.
Change History (2)
comment:1 by , 6 years ago
comment:2 by , 6 years ago
|Component:||ffmpeg → undetermined|
|Priority:||critical → normal|
|Status:||new → closed|
I don't think this is a valid ticket, the API requires you to check the source of the url if it comes from an untrusted source.
URLs for accessing files start with "file:" not with "http:" thus to open a local file with the name "http:localhost:1337.mov" would be done by
This is documented in libavformat/avformat.h
I think the issue you describe depends on incorrect use of the APIs or command line tools.
Also security issues should be discussed on email@example.com not on the public bug tracker.