Description
Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths without proper validation. By supplying a crafted subtitle download URL and a path traversal sequence in the file name, an attacker can write files to arbitrary locations on the server, potentially leading to remote code execution.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-918 Server-Side Request Forgery (SSRF)
Product status
1.10.0 (semver)
commit b7c8767 (custom)
Credits
Valentin Lobstein (Chocapikk)
References
github.com/streamaserver/streama/commit/b7c8767
chocapikk.com/posts/2025/streama-path-traversal-ssrf/
www.vulncheck.com/...nd-ssrf-leading-to-arbitrary-file-write
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.