CVE-2022-36082: CWE-20: Improper Input Validation in mansuf mangadex-downloader
mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:<location>` command and `<location>` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.
AI Analysis
Technical Summary
CVE-2022-36082 is a vulnerability identified in the mansuf mangadex-downloader, a command-line tool designed to download manga from the MangaDex platform. The affected versions range from 1.3.0 up to, but not including, 1.7.2. The vulnerability arises from improper input validation (CWE-20) when the tool processes the `file:<location>` command. Specifically, if the `<location>` parameter is provided as a web URL (using http or https schemes), the mangadex-downloader attempts to open and read files from the local disk for each line of the website's content. This behavior indicates that the tool treats web content lines as local file paths without proper sanitization or validation, potentially leading to unintended file access on the local system. The issue was addressed in version 1.7.2, which includes a patch to correct this input validation flaw. No known exploits have been reported in the wild, and the vulnerability does not appear to require authentication or user interaction beyond invoking the vulnerable command with a crafted URL. The flaw primarily impacts the confidentiality and integrity of local files, as unauthorized reading of local files could expose sensitive information or lead to further exploitation depending on the context of use. The vulnerability does not directly affect availability but could be leveraged in chained attacks. Given the nature of the tool as a niche downloader for manga content, the attack surface is limited to users of this specific software, typically individuals or communities interested in manga content from MangaDex.
Potential Impact
For European organizations, the direct impact of this vulnerability is relatively limited due to the specialized nature of the affected software, which is primarily used by individual users or enthusiasts rather than enterprise environments. However, if used within organizational environments—such as media companies, content aggregators, or cultural institutions involved in manga or digital content distribution—there is a risk of unauthorized local file disclosure. This could lead to leakage of sensitive information stored on the local machines where the tool is run. Additionally, if attackers leverage this vulnerability as part of a broader attack chain, it could facilitate lateral movement or privilege escalation by exposing configuration files, credentials, or other sensitive data. The risk is heightened in environments where endpoint security is lax or where users have elevated privileges. Since the vulnerability does not require authentication and can be triggered by processing crafted URLs, it could be exploited by tricking users into running the vulnerable command with malicious input. Overall, while the threat is not critical for most European organizations, it poses a moderate risk in specific contexts involving the affected software.
Mitigation Recommendations
1. Upgrade mangadex-downloader to version 1.7.2 or later, where the input validation issue has been patched. 2. Implement strict input validation and sanitization on any user-supplied parameters, especially those involving file paths or URLs, to prevent unintended local file access. 3. Restrict the execution of command-line tools like mangadex-downloader to trusted users and environments, minimizing exposure to untrusted inputs. 4. Employ application whitelisting and endpoint protection solutions to monitor and control the execution of such tools. 5. Educate users about the risks of running commands with untrusted parameters and encourage verification of command inputs. 6. If upgrading is not immediately possible, consider sandboxing the execution environment of the tool to limit file system access and prevent unauthorized reading of sensitive files. 7. Monitor logs for unusual file access patterns or command executions involving mangadex-downloader to detect potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2022-36082: CWE-20: Improper Input Validation in mansuf mangadex-downloader
Description
mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:<location>` command and `<location>` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36082 is a vulnerability identified in the mansuf mangadex-downloader, a command-line tool designed to download manga from the MangaDex platform. The affected versions range from 1.3.0 up to, but not including, 1.7.2. The vulnerability arises from improper input validation (CWE-20) when the tool processes the `file:<location>` command. Specifically, if the `<location>` parameter is provided as a web URL (using http or https schemes), the mangadex-downloader attempts to open and read files from the local disk for each line of the website's content. This behavior indicates that the tool treats web content lines as local file paths without proper sanitization or validation, potentially leading to unintended file access on the local system. The issue was addressed in version 1.7.2, which includes a patch to correct this input validation flaw. No known exploits have been reported in the wild, and the vulnerability does not appear to require authentication or user interaction beyond invoking the vulnerable command with a crafted URL. The flaw primarily impacts the confidentiality and integrity of local files, as unauthorized reading of local files could expose sensitive information or lead to further exploitation depending on the context of use. The vulnerability does not directly affect availability but could be leveraged in chained attacks. Given the nature of the tool as a niche downloader for manga content, the attack surface is limited to users of this specific software, typically individuals or communities interested in manga content from MangaDex.
Potential Impact
For European organizations, the direct impact of this vulnerability is relatively limited due to the specialized nature of the affected software, which is primarily used by individual users or enthusiasts rather than enterprise environments. However, if used within organizational environments—such as media companies, content aggregators, or cultural institutions involved in manga or digital content distribution—there is a risk of unauthorized local file disclosure. This could lead to leakage of sensitive information stored on the local machines where the tool is run. Additionally, if attackers leverage this vulnerability as part of a broader attack chain, it could facilitate lateral movement or privilege escalation by exposing configuration files, credentials, or other sensitive data. The risk is heightened in environments where endpoint security is lax or where users have elevated privileges. Since the vulnerability does not require authentication and can be triggered by processing crafted URLs, it could be exploited by tricking users into running the vulnerable command with malicious input. Overall, while the threat is not critical for most European organizations, it poses a moderate risk in specific contexts involving the affected software.
Mitigation Recommendations
1. Upgrade mangadex-downloader to version 1.7.2 or later, where the input validation issue has been patched. 2. Implement strict input validation and sanitization on any user-supplied parameters, especially those involving file paths or URLs, to prevent unintended local file access. 3. Restrict the execution of command-line tools like mangadex-downloader to trusted users and environments, minimizing exposure to untrusted inputs. 4. Employ application whitelisting and endpoint protection solutions to monitor and control the execution of such tools. 5. Educate users about the risks of running commands with untrusted parameters and encourage verification of command inputs. 6. If upgrading is not immediately possible, consider sandboxing the execution environment of the tool to limit file system access and prevent unauthorized reading of sensitive files. 7. Monitor logs for unusual file access patterns or command executions involving mangadex-downloader to detect potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3da2
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:20:18 PM
Last updated: 8/7/2025, 12:20:03 AM
Views: 14
Related Threats
CVE-2025-8827: OS Command Injection in Linksys RE6250
MediumCVE-2025-8826: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8825: OS Command Injection in Linksys RE6250
MediumCVE-2025-8824: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8823: OS Command Injection in Linksys RE6250
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.