Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq | Vendor Advisory |
https://github.com/jellyfin/jellyfin/blob/22d880662283980dec994cd7d35fe269613bfce3/Jellyfin.Api/Controllers/ClientLogController.cs#L44 | Exploit Vendor Advisory |
https://github.com/jellyfin/jellyfin/commit/82ad2633fdfb1c37a158057c7935f83e1129eda7 | Patch |
https://github.com/jellyfin/jellyfin/pull/5918 | Patch Vendor Advisory |
https://github.com/jellyfin/jellyfin/releases/tag/v10.8.10 | Release Notes |
https://github.com/jellyfin/jellyfin/security/advisories/GHSA-9p5f-5x8v-x65m | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-04-24T20:06:39.400Z
Updated: 2023-04-24T20:06:39.400Z
Reserved: 2023-04-13T13:25:18.833Z
Link: CVE-2023-30626
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-24T21:15:09.687
Modified: 2023-05-04T14:09:25.893
Link: CVE-2023-30626
JSON object: View
Redhat Information
No data.
CWE