CVE-2025-62511
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2025-10-21

Assigner: GitHub, Inc.

Description
yt-grabber-tui is a C++ terminal user interface application for downloading YouTube content. yt-grabber-tui version 1.0 contains a Time-of-Check to Time-of-Use (TOCTOU) race condition (CWE-367) in the creation of the default configuration file config.json. In version 1.0, load_json_settings in Settings.hpp checks for the existence of config.json using boost::filesystem::exists and, if the file is missing, calls create_json_settings which writes the JSON configuration with boost::property_tree::write_json. A local attacker with write access to the application’s configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) can create a symbolic link between the existence check and the subsequent write so that the write operation follows the symlink and overwrites an attacker-chosen file accessible to the running process. This enables arbitrary file overwrite within the privileges of the application process, which can corrupt files and cause loss of application or user data. If the application is executed with elevated privileges, this could extend to system file corruption. The issue is fixed in version 1.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2025-10-21
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zheny-creator yt-grabber-tui 1.0
zheny-creator yt-grabber-tui 1.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Time-of-Check to Time-of-Use (TOCTOU) race condition in yt-grabber-tui version 1.0. The application checks if a configuration file (config.json) exists and if not, creates it. However, between the check and the creation, a local attacker with write access to the configuration directory can create a symbolic link named config.json pointing to an arbitrary file. When the application writes the configuration, it follows the symlink and overwrites the target file, allowing arbitrary file overwrite within the application's privileges. This can corrupt files or cause data loss, and if the application runs with elevated privileges, it could lead to system file corruption. [2, 1]


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary file overwrite by a local attacker with write access to the configuration directory. Potential impacts include corruption of critical system files, loss of application or user data, privilege escalation (such as modifying /etc/sudoers to gain root access), denial-of-service by corrupting essential files like /etc/passwd, and overwriting SSH keys. The attack requires precise timing but can be automated. The severity is high, especially if the application runs with elevated privileges. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring the configuration directory (~/.config/yt-grabber-tui on Linux or the current working directory on Windows) for the presence of symbolic links named config.json, which could be used to exploit the TOCTOU race condition. On Linux systems, you can use the command 'find ~/.config/yt-grabber-tui -type l -name config.json' to detect such symlinks. Additionally, using 'inotifywait' to watch for creation or modification of symlinks in the configuration directory can help detect attempts to exploit the vulnerability in real time. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading yt-grabber-tui to version 1.0.1 or later, which contains the fix for this vulnerability by implementing atomic file creation and rename operations. If upgrading is not immediately possible, apply workarounds such as setting a strict umask (e.g., 'umask 077') to limit file permissions, avoiding running the application with elevated privileges or as root, restricting write access to the configuration directory (e.g., 'chmod 700 ~/.config/yt-grabber-tui'), and manually monitoring the configuration directory for suspicious symlinks. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart