ghsa-pwhh-q4h6-w599
Vulnerability from github
Published
2025-02-28 02:34
Modified
2025-02-28 02:34
Summary
Spotipy's cache file, containing spotify auth token, is created with overly broad permissions
Details

Summary

The CacheHandler class creates a cache file to store the auth token here: https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98

The file created has rw-r--r-- (644) permissions by default, when it could be locked down to rw------- (600) permissions. I think 600 is a sensible default.

image

Details

This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token.

PoC

Run an application that uses spotipy with client creation like this:

```python from pathlib import Path import spotipy from os import getenv

def create_spotify_client(client_id: str, client_secret: str) -> spotipy.Spotify: """Create and return an authenticated Spotify client.

Args:
    client_id: Spotify API client ID
    client_secret: Spotify API client secret

Returns:
    An authenticated Spotify client instance
"""
cache_path = Path.home() / ".cache" / "spotify-backup/.auth_cache"
cache_path.parent.mkdir(parents=True, exist_ok=True)
cache_handler = spotipy.cache_handler.CacheFileHandler(cache_path=str(cache_path))

client = spotipy.Spotify(
    auth_manager=spotipy.oauth2.SpotifyOAuth(
        client_id=client_id,
        client_secret=client_secret,
        redirect_uri="http://localhost:8000/callback",
        cache_handler=cache_handler,
        scope=[
            "user-library-read",
            "playlist-read-private",
            "playlist-read-collaborative",
        ],
    )
)

return client

create_spotify_client() ```

And then check the file permissions on the cache file that was created with:

bash $ ls -la ~/.cache/spotify-backup/.auth_cache` .rw-r--r--. alichtman alichtman 562 B Thu Feb 20 02:12:33 2025  /home/alichtman/.cache/spotify-backup/.auth_cache

If this issue is combined with another misconfiguration, like having o+r permissions set on your home directory, an attacker will be able to read this file and steal this auth token.

Good defense in depth would be to restrict read permissions on this cache file that contains an auth token

Impact

Potential exposure of Spotify auth token to other users with access to the machine. A worst case scenario is if the token is granted all permissions, and can be used to do any of:

  • exfiltrate spotify likes / saved playlists
  • delete your content
  • modify your content w/o your permission

If someone were to discover an RCE in Spotify that you could trigger on a machine by having a song played (or song metadata parsed or something), this auth token could maybe be used to add a song to a playlist, or control playback (allowing further exploitation).

Show details on source website


{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "spotipy"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.25.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2025-27154"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-276"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-28T02:34:38Z",
    "nvd_published_at": "2025-02-27T14:15:36Z",
    "severity": "HIGH"
  },
  "details": "### Summary\n\nThe `CacheHandler` class creates a cache file to store the auth token here: https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98\n\nThe file created has `rw-r--r--` (644) permissions by default, when it could be locked down to `rw-------` (600) permissions. I think `600` is a sensible default.\n\n![image](https://github.com/user-attachments/assets/0b7ebbc1-a27a-4528-ab6a-135c7886766a)\n\n### Details\n\nThis leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token.\n\n### PoC\n\nRun an application that uses spotipy with client creation like this:\n\n```python\nfrom pathlib import Path\nimport spotipy\nfrom os import getenv\n\ndef create_spotify_client(client_id: str, client_secret: str) -\u003e spotipy.Spotify:\n    \"\"\"Create and return an authenticated Spotify client.\n\n    Args:\n        client_id: Spotify API client ID\n        client_secret: Spotify API client secret\n\n    Returns:\n        An authenticated Spotify client instance\n    \"\"\"\n    cache_path = Path.home() / \".cache\" / \"spotify-backup/.auth_cache\"\n    cache_path.parent.mkdir(parents=True, exist_ok=True)\n    cache_handler = spotipy.cache_handler.CacheFileHandler(cache_path=str(cache_path))\n\n    client = spotipy.Spotify(\n        auth_manager=spotipy.oauth2.SpotifyOAuth(\n            client_id=client_id,\n            client_secret=client_secret,\n            redirect_uri=\"http://localhost:8000/callback\",\n            cache_handler=cache_handler,\n            scope=[\n                \"user-library-read\",\n                \"playlist-read-private\",\n                \"playlist-read-collaborative\",\n            ],\n        )\n    )\n\n    return client\n\ncreate_spotify_client()\n```\n\nAnd then check the file permissions on the cache file that was created with:\n\n```bash\n$ ls -la ~/.cache/spotify-backup/.auth_cache`\n.rw-r--r--. alichtman alichtman 562 B Thu Feb 20 02:12:33 2025 \uf016 /home/alichtman/.cache/spotify-backup/.auth_cache\n```\n\nIf this issue is combined with another misconfiguration, like having `o+r` permissions set on your home directory, an attacker will be able to read this file and steal this auth token.\n\nGood defense in depth would be to restrict read permissions on this cache file that contains an auth token\n\n### Impact\n\nPotential exposure of Spotify auth token to other users with access to the machine. A worst case scenario is if the token is granted all permissions, and can be used to do any of:\n\n- exfiltrate spotify likes / saved playlists\n- delete your content\n- modify your content w/o your permission\n\nIf someone were to discover an RCE in Spotify that you could trigger on a machine by having a song played (or song metadata parsed or something), this auth token could maybe be used to add a song to a playlist, or control playback (allowing further exploitation).",
  "id": "GHSA-pwhh-q4h6-w599",
  "modified": "2025-02-28T02:34:39Z",
  "published": "2025-02-28T02:34:38Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27154"
    },
    {
      "type": "WEB",
      "url": "https://github.com/spotipy-dev/spotipy/commit/1ca453f6ef87a2a9e9876f52b6cb38d13532ccf2"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/spotipy-dev/spotipy"
    },
    {
      "type": "WEB",
      "url": "https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98"
    },
    {
      "type": "WEB",
      "url": "https://github.com/spotipy-dev/spotipy/releases/tag/2.25.1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Spotipy\u0027s cache file, containing spotify auth token, is created with overly broad permissions"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…