{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-6601","assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","state":"PUBLISHED","assignerShortName":"fedora","dateReserved":"2023-12-08T06:52:14.817Z","datePublished":"2025-01-06T16:41:14.621Z","dateUpdated":"2025-11-03T19:29:00.544Z"},"containers":{"cna":{"title":"Ffmpeg: hls unsafe file extension bypass in ffmpeg","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows bypassing unsafe file extension checks and triggering arbitrary demuxers via base64-encoded data URIs appended with specific file extensions."}],"affected":[{"versions":[{"status":"affected","version":"2.0","lessThan":"6.*","versionType":"semver"}],"packageName":"FFmpeg","collectionURL":"https://github.com/FFmpeg/FFmpeg","defaultStatus":"unknown"}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253172","name":"RHBZ#2253172","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2024-02-26T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-99","description":"Improper Control of Resource Identifiers ('Resource Injection')","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-99: Improper Control of Resource Identifiers ('Resource Injection')","timeline":[{"lang":"en","time":"2023-12-06T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2024-02-26T00:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora","dateUpdated":"2025-01-06T16:41:14.621Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"metrics":[{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":4.7,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-01-06T17:07:37.194962Z","id":"CVE-2023-6601","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-06T17:08:53.541Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00004.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:29:00.544Z"}}]}}