CVE-2023-30626

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30626
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30626.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-30626
Aliases
Published
2023-04-24T21:15:09Z
Modified
2024-10-12T10:53:32.817130Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the ClientLogController, specifically /ClientLog/Document. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

References

Affected packages

Git / github.com/jellyfin/jellyfin

Affected ranges

Type
GIT
Repo
https://github.com/jellyfin/jellyfin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v10.*

v10.0.0
v10.0.1
v10.0.2
v10.2.0
v10.2.1
v10.2.2
v10.3.0
v10.3.0-rc1
v10.3.0-rc2
v10.3.1
v10.3.2
v10.3.3
v10.3.4
v10.3.5
v10.3.6
v10.3.7
v10.4.0
v10.5.0
v10.6.0
v10.8.0
v10.8.0-alpha1
v10.8.0-alpha2
v10.8.0-alpha3
v10.8.0-alpha4
v10.8.0-alpha5
v10.8.0-beta1
v10.8.0-beta2
v10.8.0-beta3
v10.8.1
v10.8.2
v10.8.3
v10.8.4
v10.8.5
v10.8.6
v10.8.7
v10.8.8
v10.8.9

v3.*

v3.5.2-5