Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq | Vendor Advisory |
https://github.com/jellyfin/jellyfin/blob/22d880662283980dec994cd7d35fe269613bfce3/Jellyfin.Api/Controllers/ClientLogController.cs#L44 | Exploit Vendor Advisory |
https://github.com/jellyfin/jellyfin/commit/82ad2633fdfb1c37a158057c7935f83e1129eda7 | Patch |
https://github.com/jellyfin/jellyfin/pull/5918 | Patch Vendor Advisory |
https://github.com/jellyfin/jellyfin/releases/tag/v10.8.10 | Release Notes |
https://github.com/jellyfin/jellyfin/security/advisories/GHSA-9p5f-5x8v-x65m | Exploit Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-04-24 21:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-30626
Mitre link : CVE-2023-30626
CVE.ORG link : CVE-2023-30626
JSON object : View
Products Affected
jellyfin
- jellyfin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')