Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5982

Опубликовано: 28 фев. 2017
Источник: debian

Описание

Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kodifixed2:18.6+dfsg1-1package
kodiignoredstretchpackage
kodiignoredjessiepackage
xbmcremovedpackage
xbmcignoredjessiepackage
xbmcignoredwheezypackage

Примечания

  • http://seclists.org/fulldisclosure/2017/Feb/27

  • http://trac.kodi.tv/ticket/17314

  • https://lists.debian.org/debian-lts/2017/04/msg00025.html

  • https://lists.debian.org/debian-lts/2017/04/msg00055.html (and followups)

  • https://lists.debian.org/debian-lts/2017/05/msg00006.html

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.

CVSS3: 7.5
nvd
почти 9 лет назад

Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.

CVSS3: 7.5
github
больше 3 лет назад

Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.