ghsa-pwhh-q4h6-w599
Vulnerability from github
Summary
The CacheHandler
class creates a cache file to store the auth token here: https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98
The file created has rw-r--r--
(644) permissions by default, when it could be locked down to rw-------
(600) permissions. I think 600
is a sensible default.
Details
This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token.
PoC
Run an application that uses spotipy with client creation like this:
```python from pathlib import Path import spotipy from os import getenv
def create_spotify_client(client_id: str, client_secret: str) -> spotipy.Spotify: """Create and return an authenticated Spotify client.
Args:
client_id: Spotify API client ID
client_secret: Spotify API client secret
Returns:
An authenticated Spotify client instance
"""
cache_path = Path.home() / ".cache" / "spotify-backup/.auth_cache"
cache_path.parent.mkdir(parents=True, exist_ok=True)
cache_handler = spotipy.cache_handler.CacheFileHandler(cache_path=str(cache_path))
client = spotipy.Spotify(
auth_manager=spotipy.oauth2.SpotifyOAuth(
client_id=client_id,
client_secret=client_secret,
redirect_uri="http://localhost:8000/callback",
cache_handler=cache_handler,
scope=[
"user-library-read",
"playlist-read-private",
"playlist-read-collaborative",
],
)
)
return client
create_spotify_client() ```
And then check the file permissions on the cache file that was created with:
bash
$ ls -la ~/.cache/spotify-backup/.auth_cache`
.rw-r--r--. alichtman alichtman 562 B Thu Feb 20 02:12:33 2025 /home/alichtman/.cache/spotify-backup/.auth_cache
If this issue is combined with another misconfiguration, like having o+r
permissions set on your home directory, an attacker will be able to read this file and steal this auth token.
Good defense in depth would be to restrict read permissions on this cache file that contains an auth token
Impact
Potential exposure of Spotify auth token to other users with access to the machine. A worst case scenario is if the token is granted all permissions, and can be used to do any of:
- exfiltrate spotify likes / saved playlists
- delete your content
- modify your content w/o your permission
If someone were to discover an RCE in Spotify that you could trigger on a machine by having a song played (or song metadata parsed or something), this auth token could maybe be used to add a song to a playlist, or control playback (allowing further exploitation).
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "spotipy" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.25.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-27154" ], "database_specific": { "cwe_ids": [ "CWE-276" ], "github_reviewed": true, "github_reviewed_at": "2025-02-28T02:34:38Z", "nvd_published_at": "2025-02-27T14:15:36Z", "severity": "HIGH" }, "details": "### Summary\n\nThe `CacheHandler` class creates a cache file to store the auth token here: https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98\n\nThe file created has `rw-r--r--` (644) permissions by default, when it could be locked down to `rw-------` (600) permissions. I think `600` is a sensible default.\n\n\n\n### Details\n\nThis leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token.\n\n### PoC\n\nRun an application that uses spotipy with client creation like this:\n\n```python\nfrom pathlib import Path\nimport spotipy\nfrom os import getenv\n\ndef create_spotify_client(client_id: str, client_secret: str) -\u003e spotipy.Spotify:\n \"\"\"Create and return an authenticated Spotify client.\n\n Args:\n client_id: Spotify API client ID\n client_secret: Spotify API client secret\n\n Returns:\n An authenticated Spotify client instance\n \"\"\"\n cache_path = Path.home() / \".cache\" / \"spotify-backup/.auth_cache\"\n cache_path.parent.mkdir(parents=True, exist_ok=True)\n cache_handler = spotipy.cache_handler.CacheFileHandler(cache_path=str(cache_path))\n\n client = spotipy.Spotify(\n auth_manager=spotipy.oauth2.SpotifyOAuth(\n client_id=client_id,\n client_secret=client_secret,\n redirect_uri=\"http://localhost:8000/callback\",\n cache_handler=cache_handler,\n scope=[\n \"user-library-read\",\n \"playlist-read-private\",\n \"playlist-read-collaborative\",\n ],\n )\n )\n\n return client\n\ncreate_spotify_client()\n```\n\nAnd then check the file permissions on the cache file that was created with:\n\n```bash\n$ ls -la ~/.cache/spotify-backup/.auth_cache`\n.rw-r--r--. alichtman alichtman 562 B Thu Feb 20 02:12:33 2025 \uf016 /home/alichtman/.cache/spotify-backup/.auth_cache\n```\n\nIf this issue is combined with another misconfiguration, like having `o+r` permissions set on your home directory, an attacker will be able to read this file and steal this auth token.\n\nGood defense in depth would be to restrict read permissions on this cache file that contains an auth token\n\n### Impact\n\nPotential exposure of Spotify auth token to other users with access to the machine. A worst case scenario is if the token is granted all permissions, and can be used to do any of:\n\n- exfiltrate spotify likes / saved playlists\n- delete your content\n- modify your content w/o your permission\n\nIf someone were to discover an RCE in Spotify that you could trigger on a machine by having a song played (or song metadata parsed or something), this auth token could maybe be used to add a song to a playlist, or control playback (allowing further exploitation).", "id": "GHSA-pwhh-q4h6-w599", "modified": "2025-02-28T02:34:39Z", "published": "2025-02-28T02:34:38Z", "references": [ { "type": "WEB", "url": "https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27154" }, { "type": "WEB", "url": "https://github.com/spotipy-dev/spotipy/commit/1ca453f6ef87a2a9e9876f52b6cb38d13532ccf2" }, { "type": "PACKAGE", "url": "https://github.com/spotipy-dev/spotipy" }, { "type": "WEB", "url": "https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98" }, { "type": "WEB", "url": "https://github.com/spotipy-dev/spotipy/releases/tag/2.25.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Spotipy\u0027s cache file, containing spotify auth token, is created with overly broad permissions" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.