Lucene search

K
githubGitHub Advisory DatabaseGHSA-QWP3-5FW3-5WGV
HistoryAug 20, 2022 - 12:00 a.m.

Incorrect Access Control and Cross Site Scripting in Jellyfin

2022-08-2000:00:39
CWE-79
GitHub Advisory Database
github.com
11
jellyfin
access control
cross site scripting
software upgrade

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.3%

In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.

Affected configurations

Vulners
Node
jellyfin.commonRange<10.8.0
CPENameOperatorVersion
jellyfin.commonlt10.8.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.3%

Related for GHSA-QWP3-5FW3-5WGV