Lucene search

K
cveGitHub_MCVE-2023-30626
HistoryApr 24, 2023 - 9:15 p.m.

CVE-2023-30626

2023-04-2421:15:09
CWE-22
GitHub_M
web.nvd.nist.gov
33
jellyfin
cve-2023-30626
directory traversal
xss
media system
security vulnerability
nvd

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

49.9%

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the ClientLogController, specifically /ClientLog/Document. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

Affected configurations

Nvd
Vulners
Node
jellyfinjellyfinRange10.8.010.8.10
VendorProductVersionCPE
jellyfinjellyfin*cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jellyfin",
    "product": "jellyfin",
    "versions": [
      {
        "version": ">= 10.8.0, < 10.8.10",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

49.9%