Lucene search

K
nvd[email protected]NVD:CVE-2023-48702
HistoryDec 13, 2023 - 9:15 p.m.

CVE-2023-48702

2023-12-1321:15:07
CWE-77
web.nvd.nist.gov
2
jellyfin
media streaming
arbitrary file execution
security vulnerability
unc path
network share

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Jellyfin is a system for managing and streaming media. Prior to version 10.8.13, the /System/MediaEncoder/Path endpoint executes an arbitrary file using ProcessStartInfo via the ValidateVersion function. A malicious administrator can setup a network share and supply a UNC path to /System/MediaEncoder/Path which points to an executable on the network share, causing Jellyfin server to run the executable in the local context. The endpoint was removed in version 10.8.13.

Affected configurations

Nvd
Node
jellyfinjellyfinRange<10.8.13
VendorProductVersionCPE
jellyfinjellyfin*cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Related for NVD:CVE-2023-48702