CVE-2024-35236

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35236
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35236.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35236
Related
  • GHSA-7j99-76cj-q9pg
Published
2024-05-27T17:15:09Z
Modified
2025-01-08T16:06:58.585628Z
Summary
[none]
Details

Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.10.0, opening an ebook with malicious scripts inside leads to code execution inside the browsing context. Attacking a user with high privileges (upload, creation of libraries) can lead to remote code execution (RCE) in the worst case. This was tested on version 2.9.0 on Windows, but an arbitrary file write is powerful enough as is and should easily lead to RCE on Linux, too. Version 2.10.0 contains a patch for the vulnerability.

References

Affected packages

Git / github.com/advplyr/audiobookshelf

Affected ranges

Type
GIT
Repo
https://github.com/advplyr/audiobookshelf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.9.61-beta
0.9.61-beta.0

v1.*

v1.0.0
v1.1.10
v1.1.11
v1.1.12
v1.1.13
v1.1.14
v1.1.15
v1.1.8
v1.1.9
v1.2.1
v1.2.4
v1.2.5
v1.2.6
v1.2.8
v1.3.1
v1.3.3
v1.3.4
v1.4.0
v1.4.1
v1.4.11
v1.4.2
v1.4.4
v1.4.6
v1.4.7
v1.4.9
v1.5.0
v1.5.5
v1.6.0
v1.7.0
v1.7.1
v1.7.2

v2.*

v2.0.1
v2.0.10
v2.0.11
v2.0.12
v2.0.13
v2.0.14
v2.0.15
v2.0.16
v2.0.17
v2.0.18
v2.0.19
v2.0.2
v2.0.20
v2.0.21
v2.0.22
v2.0.23
v2.0.24
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.1.4
v2.1.5
v2.2.0
v2.2.1
v2.2.10
v2.2.11
v2.2.12
v2.2.13
v2.2.14
v2.2.15
v2.2.16
v2.2.17
v2.2.18
v2.2.19
v2.2.2
v2.2.20
v2.2.21
v2.2.22
v2.2.23
v2.2.3
v2.2.4
v2.2.5
v2.2.6
v2.2.7
v2.2.8
v2.2.9
v2.3.0
v2.3.1
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.4.0
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.5.0
v2.6.0
v2.7.0
v2.7.1
v2.7.2
v2.8.0
v2.8.1
v2.9.0