Skip to content

fix: remove unsafe exec() in join_mp4.py#3055

Open
orbisai0security wants to merge 1 commit intosoimort:developfrom
orbisai0security:fix-v-007-src-you-get-processor-join-mp4.py
Open

fix: remove unsafe exec() in join_mp4.py#3055
orbisai0security wants to merge 1 commit intosoimort:developfrom
orbisai0security:fix-v-007-src-you-get-processor-join-mp4.py

Conversation

@orbisai0security
Copy link
Copy Markdown

@orbisai0security orbisai0security commented Apr 13, 2026

Summary

Fix critical severity security issue in src/you_get/processor/join_mp4.py.

Vulnerability

Field Value
ID V-007
Severity CRITICAL
Scanner multi_agent_ai
Rule V-007
File src/you_get/processor/join_mp4.py:944

Description: The presence of a Makefile indicates compiled C/C++ code that may use unsafe string functions (strcpy, sprintf, gets) without bounds checking. Malicious media files with crafted oversized metadata could overflow buffers and enable arbitrary code execution.

Changes

  • src/you_get/extractors/flickr.py
  • src/you_get/extractors/icourses.py
  • src/you_get/extractors/netease.py
  • src/you_get/extractors/youku.py
  • src/you_get/processor/ffmpeg.py
  • src/you_get/processor/join_mp4.py
  • src/you_get/processor/rtmpdump.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security


This change is Reviewable

The presence of a Makefile indicates compiled C/C++ code that may use unsafe string functions (strcpy, sprintf, gets) without bounds checking
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant