Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.
References
Configurations
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq - Vendor Advisory | |
References | () https://github.com/jellyfin/jellyfin/blob/22d880662283980dec994cd7d35fe269613bfce3/Jellyfin.Api/Controllers/ClientLogController.cs#L44 - Exploit, Vendor Advisory | |
References | () https://github.com/jellyfin/jellyfin/commit/82ad2633fdfb1c37a158057c7935f83e1129eda7 - Patch | |
References | () https://github.com/jellyfin/jellyfin/pull/5918 - Patch, Vendor Advisory | |
References | () https://github.com/jellyfin/jellyfin/releases/tag/v10.8.10 - Release Notes | |
References | () https://github.com/jellyfin/jellyfin/security/advisories/GHSA-9p5f-5x8v-x65m - Exploit, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Information
Published : 2023-04-24 21:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30626
Mitre link : CVE-2023-30626
CVE.ORG link : CVE-2023-30626
JSON object : View
Products Affected
jellyfin
- jellyfin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')