Lucene search

K
cveGitHub_MCVE-2023-30627
HistoryApr 24, 2023 - 9:15 p.m.

CVE-2023-30627

2023-04-2421:15:09
CWE-79
GitHub_M
web.nvd.nist.gov
26
jellyfin
jellyfin-web
cve-2023-30627
cross-site scripting
stored xss
remote code execution
nvd
vulnerability
security
patch

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

49.9%

jellyfin-web is the web client for Jellyfin, a free-software media system. Starting in version 10.1.0 and prior to version 10.8.10, a stored cross-site scripting vulnerability in device.js can be used to make arbitrary calls to the REST endpoints with admin privileges. When combined with CVE-2023-30626, this results in remote code execution on the Jellyfin instance in the context of the user who’s running it. This issue is patched in version 10.8.10. There are no known workarounds.

Affected configurations

Nvd
Vulners
Node
jellyfinjellyfinRange10.1.010.8.10
VendorProductVersionCPE
jellyfinjellyfin*cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jellyfin",
    "product": "jellyfin-web",
    "versions": [
      {
        "version": ">= 10.1.0, < 10.8.10",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

49.9%