Логотип exploitDog
bind:CVE-2023-30626
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-30626

Количество 3

Количество 3

nvd логотип

CVE-2023-30626

почти 3 года назад

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2023-30626

почти 3 года назад

Jellyfin is a free-software media system. Versions starting with 10.8. ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9p5f-5x8v-x65m

почти 3 года назад

Directory traversal + file write causing arbitrary code execution

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-30626

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

CVSS3: 8.8
1%
Низкий
почти 3 года назад
debian логотип
CVE-2023-30626

Jellyfin is a free-software media system. Versions starting with 10.8. ...

CVSS3: 8.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-9p5f-5x8v-x65m

Directory traversal + file write causing arbitrary code execution

CVSS3: 8.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу