CVE-2023-30626

Source
https://cve.org/CVERecord?id=CVE-2023-30626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30626
Aliases
Related
Published
2023-04-24T20:06:39.400Z
Modified
2026-02-28T08:08:19.274231Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jellyfin vulnerable to directory traversal and file write causing arbitrary code execution
Details

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the ClientLogController, specifically /ClientLog/Document. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30626.json"
}
References

Affected packages

Git / github.com/jellyfin/jellyfin

Affected ranges

Type
GIT
Repo
https://github.com/jellyfin/jellyfin
Events

Affected versions

v10.*
v10.8.0
v10.8.1
v10.8.2
v10.8.3
v10.8.4
v10.8.5
v10.8.6
v10.8.7
v10.8.8
v10.8.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30626.json"

Git / github.com/jellyfin/jellyfin-web

Affected ranges

Type
GIT
Repo
https://github.com/jellyfin/jellyfin-web
Events

Affected versions

v10.*
v10.8.0
v10.8.1
v10.8.2
v10.8.3
v10.8.4
v10.8.5
v10.8.6
v10.8.7
v10.8.8
v10.8.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30626.json"