This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Directory Traversal in Bazarr v1.4.3. π **Consequences**: Unauthenticated attackers can read arbitrary files (e.g., /etc/passwd). Critical data leak risk! π
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Lack of input validation on filename parameters. π **Flaw**: Allows path traversal sequences (`../`) to escape the intended directory. CWE-22 equivalent. π
Q3Who is affected? (Versions/Components)
π¦ **Affected**: Bazarr software. π **Version**: v1.4.3 and prior. π€ **Context**: Companion app for Sonarr/Radarr. β οΈ Check your subtitle manager version! π
π **Threshold**: LOW. π **Auth**: None required. π **Config**: Exposed web interface is enough. Easy to exploit for anyone with network access. π―