Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-addons-dev" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-bin" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-bin-dbgsym" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-data" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-common" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-dev" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-kodi-send" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-ps3" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-wiiremote" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-eventclients-wiiremote-dbgsym" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-gbm" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-gbm-dbgsym" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-repository-kodi" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-wayland" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-wayland-dbgsym" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-x11" }, { "binary_version": "2:18.6+dfsg1-2ubuntu1", "binary_name": "kodi-x11-dbgsym" } ] }